zeek-scripts
☆44Dec 27, 2018Updated 7 years ago
Alternatives and similar repositories for zeek-scripts
Users that are interested in zeek-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- Extract files from network traffic with Zeek.☆102Mar 17, 2020Updated 6 years ago
- A Zeek log writer plugin that publishes to Kafka.☆53Aug 18, 2025Updated 7 months ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Aug 5, 2025Updated 7 months ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 6 months ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 5 years ago
- Extracting and analyzing URLs from Emails for phishing events☆21Oct 22, 2020Updated 5 years ago
- Plugin providing native AF_Packet support for Zeek.☆33Oct 22, 2025Updated 5 months ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- A set of Zeek scripts to detect ATT&CK techniques.☆622Jun 26, 2024Updated last year
- ☆18Dec 20, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Bro IDS programs collection.☆146Oct 16, 2019Updated 6 years ago
- ☆75Apr 3, 2025Updated 11 months ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- Suricata rules for the new critical vulnerabilities☆84Jan 26, 2021Updated 5 years ago
- ☆38Nov 2, 2024Updated last year
- Plugin for Zeek/Bro which provides http2 decoder/analyzer☆30Jun 11, 2024Updated last year
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Jul 12, 2021Updated 4 years ago
- Zeek package to create JSON formatted logs to stream into data analysis systems.☆30Dec 3, 2025Updated 3 months ago
- ☆24Jan 19, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Zeek Training Materials/Products☆41Mar 12, 2026Updated 2 weeks ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 4 years ago
- Zeek-Formatted Threat Intelligence Feeds☆392Updated this week
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Dec 16, 2023Updated 2 years ago
- some config files☆14Feb 23, 2026Updated last month
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆53Aug 22, 2021Updated 4 years ago
- A Python implementation of the Community ID flow hashing standard☆23Nov 29, 2023Updated 2 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆33Mar 16, 2026Updated last week
- ☆29Nov 15, 2022Updated 3 years ago
- your censor is my censor: weaponizing residual censorship to perform availability attacks☆22Aug 10, 2021Updated 4 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago