lmco / vortex-idsLinks
Vortex is a near real time IDS and network surveillance engine for TCP stream data.
☆99Updated 8 years ago
Alternatives and similar repositories for vortex-ids
Users that are interested in vortex-ids are comparing it to the libraries listed below
Sorting:
- Bro IDS programs collection.☆146Updated 5 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- Bro-IDS scripts☆50Updated 8 years ago
- Threatbutt python client and Maltego transforms☆51Updated last year
- Data Analysis and Visualization Linux Toolset☆58Updated 8 years ago
- Dockerfiles for NSM tools☆84Updated 8 years ago
- ☆85Updated 12 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 8 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 10 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆82Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- ☆208Updated 7 years ago
- Transparent network tap☆119Updated 9 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Repo for the Open Source version of NOVA☆77Updated 2 years ago
- Bro scripts to be shared with the community☆111Updated 12 years ago
- (OBSOLETE) Plugins for Bro☆53Updated 7 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 10 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- ☆72Updated 3 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Quantum Insert☆213Updated 6 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 9 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Updated 8 years ago
- NTP logger/honeypot☆54Updated 11 years ago