nccgroup / IP-reputation-snort-rule-generator
A tool to generate Snort rules based on public IP reputation data
☆56Updated 11 years ago
Alternatives and similar repositories for IP-reputation-snort-rule-generator:
Users that are interested in IP-reputation-snort-rule-generator are comparing it to the libraries listed below
- Passive DNS V2☆61Updated 11 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Various Bro scripts☆96Updated 8 years ago
- ☆75Updated 3 years ago
- integrating bro into yara☆33Updated 10 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- malware-traffic-analysis.net PCAPs repository.☆35Updated 8 years ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- Manage VT Alerts☆62Updated 8 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- ☆85Updated 11 years ago
- Mitre chopshop network decoder framework☆30Updated 8 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆80Updated 9 years ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 11 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Yara rules☆48Updated 11 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 8 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- ☆71Updated 3 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- ☆37Updated 10 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Analysis scripts for the Bro Intrusion Detection System☆59Updated 11 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆41Updated 12 years ago
- a collection of public yara rules☆26Updated 5 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Some IR notes☆73Updated 8 years ago