nccgroup / IP-reputation-snort-rule-generator
A tool to generate Snort rules based on public IP reputation data
☆56Updated 11 years ago
Alternatives and similar repositories for IP-reputation-snort-rule-generator:
Users that are interested in IP-reputation-snort-rule-generator are comparing it to the libraries listed below
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- Various Bro scripts☆96Updated 8 years ago
- Mitre chopshop network decoder framework☆30Updated 8 years ago
- ☆85Updated 11 years ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- Bro scripts to be shared with the community☆109Updated 11 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Yara rules☆47Updated 11 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- ☆22Updated 7 years ago
- ☆37Updated 10 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 11 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Updated 9 years ago
- Passive DNS V2☆62Updated 10 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- Some IR notes☆73Updated 8 years ago
- Manage VT Alerts☆62Updated 8 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- ☆75Updated 3 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- My Yara Rules Collection☆52Updated 9 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Shared yara rules☆30Updated 10 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 7 years ago
- Extract files from network traffic with Zeek.