mytechnotalent / Zeek-Network-Security-MonitorLinks
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
☆62Updated 2 years ago
Alternatives and similar repositories for Zeek-Network-Security-Monitor
Users that are interested in Zeek-Network-Security-Monitor are comparing it to the libraries listed below
Sorting:
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- ☆35Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 5 months ago
- ☆51Updated 3 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆78Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆57Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- Incident Response Network Tools☆24Updated 3 years ago
- ☆29Updated 4 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- Searches for Insider Threat Hunting☆32Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- misp-cloud - Cloud-ready images of MISP☆73Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Wrap any binary into a cached webserver☆53Updated 3 years ago