openargus / argusLinks
Argus Sensor
☆67Updated last month
Alternatives and similar repositories for argus
Users that are interested in argus are comparing it to the libraries listed below
Sorting:
- Argus clients program repo☆22Updated 2 weeks ago
- Open source endpoint agent providing host information to Zeek. [v2]☆83Updated last week
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆179Updated 3 months ago
- Suricata Verification Tests - Testing Suricata Output☆111Updated this week
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆181Updated 9 months ago
- The tool for updating your Suricata rules.☆276Updated 2 weeks ago
- Mercury: network metadata capture and analysis☆468Updated last month
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆82Updated 2 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆483Updated last month
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 11 months ago
- Accurate, modular, scalable PCAP manipulation tool written in Go.☆91Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆416Updated last week
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆74Updated 3 weeks ago
- The Security Analyst’s Guide to Suricata☆56Updated 2 months ago
- ☆57Updated 6 years ago
- Suricata rules for network anomaly detection☆165Updated 3 months ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated 2 years ago
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆807Updated this week
- Red Canary's eBPF Sensor☆108Updated last month
- Python rewrite of passive OS fingerprinting tool☆176Updated 2 months ago
- Suricata Extreme Performance Tuning guide - Mark II☆117Updated 7 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Updated 4 years ago
- Zeek-Formatted Threat Intelligence Feeds☆374Updated this week
- System for network traffic analysis and anomaly detection.☆91Updated last week
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆93Updated last month
- ☆15Updated last year
- STIX data representing MITRE ATT&CK☆427Updated 2 months ago
- High Speed PCAP to JSON conversion utility☆104Updated last year
- OpenCTI Python Client☆138Updated this week
- packet captures of real-world ddos attacks☆163Updated last week