mytechnotalent / Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
☆61Updated 2 years ago
Alternatives and similar repositories for Zeek-Network-Security-Monitor:
Users that are interested in Zeek-Network-Security-Monitor are comparing it to the libraries listed below
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- ☆34Updated 4 years ago
- automate your MISP installs☆67Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆48Updated 2 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- Automatic detection engineering technical state compliance☆54Updated 8 months ago
- ☆51Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆94Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- ☆52Updated this week
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆25Updated this week
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- ☆29Updated 4 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 3 months ago
- Tool used to perform threat intelligence against packet data☆35Updated last month
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- an awesome list of active defense resources☆118Updated 4 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆66Updated last year
- Sharing Threat Hunting runbooks☆25Updated 5 years ago