A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
☆62Nov 26, 2025Updated 3 months ago
Alternatives and similar repositories for Zeek-Network-Security-Monitor
Users that are interested in Zeek-Network-Security-Monitor are comparing it to the libraries listed below
Sorting:
- ☆11May 30, 2021Updated 4 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Jul 21, 2020Updated 5 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Nov 26, 2025Updated 3 months ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated 11 months ago
- ☆19Jun 16, 2021Updated 4 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Dec 16, 2023Updated 2 years ago
- THOR Thunderstorm Collectors☆25Feb 26, 2026Updated last week
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆75Jun 13, 2021Updated 4 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 12, 2019Updated 6 years ago
- CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket☆11Apr 15, 2021Updated 4 years ago
- ☆13Feb 25, 2021Updated 5 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Tool for managing Zeek deployments.☆60Feb 23, 2026Updated last week
- A Spicy protocol analyzer for WireGuard☆29Aug 11, 2020Updated 5 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆17Aug 31, 2018Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Generate network maps from packet captures☆30Sep 15, 2019Updated 6 years ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- TCP Network Port Scanner written in Go, nmap style.☆19Mar 7, 2020Updated 5 years ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 5 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Apr 25, 2025Updated 10 months ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34May 18, 2020Updated 5 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Nov 26, 2025Updated 3 months ago
- ☆14Aug 16, 2021Updated 4 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- Zeek Training Materials/Products☆41Feb 2, 2026Updated last month
- List of sources for cybersecurity news☆41Dec 16, 2022Updated 3 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆15Nov 16, 2023Updated 2 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆259Feb 9, 2026Updated 3 weeks ago