packetloop / packetpig
Packetpig - Open Source Big Data Security Analytics
☆298Updated 6 years ago
Alternatives and similar repositories for packetpig:
Users that are interested in packetpig are comparing it to the libraries listed below
- (OBSOLETE) Plugins for Bro☆53Updated 7 years ago
- User interface for OpenSOC☆100Updated 9 years ago
- Extensible set of Storm topologies and topology attributes for streaming, enriching, indexing, and storing telemetry in Hadoop.☆132Updated last year
- Misc. Bro scripts☆63Updated 7 years ago
- Dockerfiles for NSM tools☆84Updated 8 years ago
- Data Analysis and Visualization Linux Toolset☆58Updated 7 years ago
- ☆71Updated 3 years ago
- Bro scripts written by CrowdStrike Services☆146Updated 3 years ago
- Bro IDS programs collection.☆146Updated 5 years ago
- Bro-IDS scripts☆50Updated 8 years ago
- Bro IDS Dockerfile☆129Updated 5 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Vagrantfile and scripts for building a disposable OpenSOC Cluster☆29Updated 8 years ago
- A collection of Bro scripts I've written☆40Updated 9 years ago
- ☆75Updated 3 years ago
- OpenFPC, Open Source Full Packet Capture☆72Updated 6 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Updated 10 years ago
- Meeting notes☆15Updated 9 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆148Updated 10 years ago
- ☆85Updated 11 years ago
- A Distributed, Search-Optimized Full Packet Capture System☆242Updated 2 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆227Updated 7 years ago
- A Framework for managing Cyber Threat Intelligence.☆5Updated 6 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Various Bro scripts☆96Updated 8 years ago
- Ipython notebook that illustrates effectiveness of machine learning algorithms in anomaly detection of netflow data (inbound/outbound DDo…☆78Updated 7 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago
- Docker container for MISP☆96Updated 6 years ago
- Analysis scripts for the Bro Intrusion Detection System