mammo0 / docker-arkimeLinks
A Docker container for Arkime based on Ubuntu
☆34Updated 2 weeks ago
Alternatives and similar repositories for docker-arkime
Users that are interested in docker-arkime are comparing it to the libraries listed below
Sorting:
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated 2 weeks ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆159Updated 8 months ago
- This repository maintains the SaltStack state files for the REMnux distro.☆53Updated last week
- Zeek IDS Dockerfile☆101Updated 3 years ago
- ☆56Updated 3 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆107Updated last year
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 2 years ago
- Docker files for building Zeek.☆88Updated 2 years ago
- ☆37Updated 4 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆105Updated last year
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆64Updated last year
- ☆52Updated 2 weeks ago
- Corelight@Home script☆46Updated 2 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- Suricata rules for network anomaly detection☆180Updated 2 weeks ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Convert Sigma rules to Wazuh rules☆73Updated 3 months ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- CyRIS: Cyber Range Instantiation System☆107Updated 11 months ago
- Set of Yara rules for finding files using magics headers☆140Updated 5 years ago
- MISP Docker (XME edition)☆283Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 weeks ago
- Docker image for MISP☆135Updated 2 weeks ago
- Run zeek with zeekctl in docker☆59Updated last year
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆76Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79Updated 3 years ago