jsiwek / zeek-cryptomining
Detect cryptocurrency mining traffic with Zeek.
☆46Updated 3 years ago
Alternatives and similar repositories for zeek-cryptomining:
Users that are interested in zeek-cryptomining are comparing it to the libraries listed below
- Various Bro scripts☆96Updated 8 years ago
- Bro scripts to be shared with the community☆109Updated 11 years ago
- Contributed Bro Scripts☆30Updated 10 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Misc. Bro scripts☆63Updated 7 years ago
- Extract files from network traffic with Zeek.☆100Updated 4 years ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- ☆71Updated 3 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 3 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- Ready to run scripts for network analysis☆88Updated this week
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- scan-detection policies for bro☆15Updated last month
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Bro Intel Feed Linter☆26Updated 5 years ago
- ☆85Updated 11 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 6 years ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- Bro-IDS scripts☆50Updated 8 years ago
- ☆75Updated 3 years ago
- Cyber Intel Management☆48Updated 7 years ago
- CIFv3 DeploymentKit☆63Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆37Updated 9 years ago
- Improvements of/over the original rule2alert☆56Updated 10 years ago
- Detecting DGA bots in a single network using DNS traffic☆26Updated 7 years ago
- Top DNS Measurement for Bro☆11Updated 4 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year