lmco / vortex-ids
Vortex is a near real time IDS and network surveillance engine for TCP stream data.
☆97Updated 8 years ago
Alternatives and similar repositories for vortex-ids:
Users that are interested in vortex-ids are comparing it to the libraries listed below
- Script for generating Bro intel files from pdf or html reports☆76Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- Bro-IDS scripts☆50Updated 8 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆111Updated 8 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Updated 8 years ago
- The Official Github Repository of Daemonlogger☆21Updated 3 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆155Updated 9 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆20Updated 9 years ago
- ☆85Updated 11 years ago
- Bro IDS programs collection.☆146Updated 5 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago
- Data Analysis and Visualization Linux Toolset☆58Updated 7 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Improvements of/over the original rule2alert☆56Updated 10 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 4 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- ☆71Updated 3 years ago
- ☆75Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆98Updated 8 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago
- Threatbutt python client and Maltego transforms☆51Updated 9 months ago