kost / docker-molochLinks
A Docker container for Moloch based on minimal Debian
☆26Updated 9 years ago
Alternatives and similar repositories for docker-moloch
Users that are interested in docker-moloch are comparing it to the libraries listed below
Sorting:
- Passive DNS V2☆60Updated 11 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 9 years ago
- Bro-IDS scripts☆50Updated 8 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆47Updated 11 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆80Updated 9 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- ☆24Updated 5 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Updated 10 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- Detect Phishing with Bro IDS☆18Updated 8 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- ☆71Updated 3 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- ☆22Updated 7 years ago
- A collection of Bro scripts I've written☆40Updated 9 years ago
- Bro Intel Feed Linter☆26Updated 5 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- ☆85Updated 11 years ago
- integrating bro into yara☆33Updated 10 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- Quickly generate snort rules for IOCs☆18Updated 9 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Updated 8 years ago
- scan-detection policies for bro☆16Updated 4 months ago