jsiwek / zeek-cryptominingLinks
Detect cryptocurrency mining traffic with Zeek.
☆46Updated 4 years ago
Alternatives and similar repositories for zeek-cryptomining
Users that are interested in zeek-cryptomining are comparing it to the libraries listed below
Sorting:
- Extract files from network traffic with Zeek.☆102Updated 5 years ago
- Bro scripts to be shared with the community☆111Updated 12 years ago
- Various Bro scripts☆96Updated 9 years ago
- ☆75Updated 3 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated 2 years ago
- ☆85Updated 12 years ago
- Bro/Zeek integration with osquery☆94Updated 5 years ago
- ☆72Updated 4 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Updated 7 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 10 years ago
- Malware/IOC ingestion and processing engine☆109Updated 7 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 10 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- Contributed Bro Scripts☆30Updated 11 years ago
- a network packet capture compiler☆205Updated 3 years ago
- Open Source Telnet Honeypot☆106Updated 8 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆177Updated 4 years ago
- Docker container for MISP☆96Updated 7 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆124Updated 5 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Updated 7 months ago
- ☆174Updated 4 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 12 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated 2 years ago
- Bro scripts written by CrowdStrike Services☆148Updated 4 years ago
- DGA Domains detection☆70Updated 7 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 4 years ago
- DNSDB query scripts☆75Updated 6 years ago
- Threat Intelligence APIs☆282Updated 2 years ago