mrdraper / Packet2SnortLinks
A Python script that generates Snort IDS rules from network packets
☆25Updated 7 years ago
Alternatives and similar repositories for Packet2Snort
Users that are interested in Packet2Snort are comparing it to the libraries listed below
Sorting:
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Web service for scanning pcaps with snort☆109Updated 6 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆38Updated 9 years ago
- A set of ICS IDS rules for use with Suricata.☆50Updated last year
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago
- OpenFlow Honeypot☆23Updated 12 years ago
- This is an open source Snort rules repository☆30Updated 3 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- malware-traffic-analysis.net PCAPs repository.☆36Updated 8 years ago
- Checkpot Honeypot Checker☆43Updated 6 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- A repository for OSSEC rules and decoders☆54Updated last year
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Updated 6 years ago
- Snort rules☆35Updated 6 years ago
- Plugin for Zeek/Bro which provides http2 decoder/analyzer☆31Updated 11 months ago
- Pcap (capture file) Analysis Toolkit(v.1)☆106Updated 8 years ago
- Maltese - Malware Traffic Emulator☆26Updated 8 years ago
- Industrial control Security Tool☆77Updated 4 years ago
- Open source tools for realistic-behaving electric grid honeynets☆55Updated 10 years ago