mytechnotalent / Zeek-Network-Security-MonitorLinks
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
☆63Updated 2 years ago
Alternatives and similar repositories for Zeek-Network-Security-Monitor
Users that are interested in Zeek-Network-Security-Monitor are comparing it to the libraries listed below
Sorting:
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- an awesome list of active defense resources☆124Updated 5 years ago
- ☆52Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- A collection of tips for using MISP.☆74Updated 8 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 5 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆39Updated 4 months ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- ☆90Updated last week
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 4 months ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆87Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 7 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- Incident Response Network Tools☆24Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Automatic detection engineering technical state compliance☆55Updated last year