michalpurzynski / zeek-scripts
zeek-scripts
☆44Updated 6 years ago
Alternatives and similar repositories for zeek-scripts:
Users that are interested in zeek-scripts are comparing it to the libraries listed below
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆102Updated 3 years ago
- Zeek Training Materials/Products☆37Updated 2 months ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Log Entry to Sigma Rule Converter☆107Updated 3 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆77Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆78Updated 2 years ago
- ☆78Updated 4 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆34Updated 4 months ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 9 months ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆58Updated 5 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆109Updated 5 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 3 months ago
- How to Zeek Sysmon Logs!☆101Updated 3 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆137Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆93Updated this week
- Suricata rules for network anomaly detection☆160Updated 3 weeks ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- Community driven repository of Playbooks and Apps for ThreatConnect.☆69Updated 3 months ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆187Updated 4 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Zeek support for Community ID flow hashing.☆35Updated last year
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago