petabi / snifflesLinks
Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation
☆63Updated 4 years ago
Alternatives and similar repositories for sniffles
Users that are interested in sniffles are comparing it to the libraries listed below
Sorting:
- Passive DNS V2☆60Updated 11 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- A simple Nessus results viewer☆49Updated 11 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- ☆27Updated 7 years ago
- Maltese - Malware Traffic Emulator☆26Updated 8 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Incident Response Scripts☆30Updated 5 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆57Updated 8 months ago
- repo for sharing stuff☆16Updated last year
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆17Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago