mrlesmithjr / ansible-suricataLinks
☆12Updated 5 years ago
Alternatives and similar repositories for ansible-suricata
Users that are interested in ansible-suricata are comparing it to the libraries listed below
Sorting:
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- ☆12Updated 5 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 2 years ago
- Low-interaction Postgres Honeypot☆20Updated last year
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Parse nmap scan data with Perl (official repo)☆37Updated 6 years ago
- A low/zero interaction ssh authentication logging honeypot☆25Updated 2 months ago
- OwlH Master API Web User Interface☆12Updated last year
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆40Updated 7 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Updated last year
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆19Updated 2 years ago
- ☆52Updated last week
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Updated 3 years ago
- Community-based CybergON-powered Suricata rules☆12Updated 3 years ago
- server for indexing and querying passive DNS observations☆49Updated last month
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆19Updated 11 years ago
- Suricata rule and intel index☆33Updated last month
- Proof-of-concept for phishing intelligence in Elastic☆15Updated 6 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated 11 months ago
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- A Python-based client for the Cisco openVuln API☆38Updated last month
- How to send structured Snort IDS alert logs into Graylog☆27Updated 2 months ago
- BRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to captu…☆19Updated 5 years ago
- Alert condition plugin for Graylog to perform aggregation☆21Updated 2 years ago