Packetpig - Open Source Big Data Security Analytics
☆298May 14, 2018Updated 7 years ago
Alternatives and similar repositories for packetpig
Users that are interested in packetpig are comparing it to the libraries listed below
Sorting:
- Hadoop library to read packet capture (PCAP) files☆212Jun 14, 2023Updated 2 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- An open source pcap packet and NetFlow file analysis tool using Hadoop MapReduce and Hive.☆44Jul 29, 2013Updated 12 years ago
- Open Source Cyber Security Platform☆30Jul 26, 2013Updated 12 years ago
- (OBSOLETE) Plugins for Bro☆53Sep 13, 2017Updated 8 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Nov 24, 2014Updated 11 years ago
- PacketSled's Bro AMQP Writer Plugin☆11Aug 5, 2016Updated 9 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- viewssld is a free, open source, non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort, and other Network Intrusion Detecti…☆74Aug 13, 2017Updated 8 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- User interface for OpenSOC☆100Aug 6, 2015Updated 10 years ago
- Meeting notes☆14Apr 5, 2016Updated 9 years ago
- Compare multiple log formats against malware reputation lists.☆88Jul 27, 2017Updated 8 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- OpenSOC Apache Hadoop Code☆581Feb 19, 2020Updated 6 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Code for try.zeek.org.☆18Updated this week
- An example Spark Streaming application processing PCAP data.☆21Feb 24, 2017Updated 9 years ago
- Malicious HTTP traffic explorer☆724Mar 16, 2023Updated 2 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- DNS Looking Glass☆76Dec 29, 2019Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Aug 7, 2015Updated 10 years ago
- ☆84Aug 7, 2013Updated 12 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Challenges used at the Cambridge 2 Cambridge event☆22May 26, 2016Updated 9 years ago
- Deliberately vulnerable web application☆22Jun 18, 2017Updated 8 years ago
- CEF plugin for audisp (Linux Audit)☆23Aug 19, 2016Updated 9 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Intel Ethernet Switch (IES) software☆12Feb 14, 2016Updated 10 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆181Jun 23, 2024Updated last year