kost / docker-molochLinks
A Docker container for Moloch based on minimal Debian
☆26Updated 9 years ago
Alternatives and similar repositories for docker-moloch
Users that are interested in docker-moloch are comparing it to the libraries listed below
Sorting:
- Passive DNS V2☆60Updated 11 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 10 years ago
- NTP logger/honeypot☆54Updated 11 years ago
- Bro scripts to be shared with the community☆111Updated 12 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- ☆22Updated 7 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- ☆85Updated 12 years ago
- OpenDNS Graph Miner☆45Updated 8 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Updated 8 years ago
- Cyber Intel Management☆49Updated 7 years ago
- a Malware/Threat Analyst Desktop☆89Updated 10 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- Modern Honey Network App for Splunk☆50Updated 6 years ago
- Mitre chopshop network decoder framework☆30Updated 9 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- ☆72Updated 3 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- Honeypot repo☆48Updated 10 years ago
- Bro-IDS scripts☆50Updated 9 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 12 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 8 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆82Updated 9 years ago