rkovar / dns_detection
Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration
☆39Updated 9 years ago
Alternatives and similar repositories for dns_detection:
Users that are interested in dns_detection are comparing it to the libraries listed below
- ☆55Updated 3 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 4 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Cyber Intel Management☆48Updated 7 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆68Updated 3 years ago
- Various Bro scripts☆96Updated 8 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Sysmon Splunk App☆46Updated 6 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆123Updated 3 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Updated 4 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Scripts for TheHive.☆22Updated 5 years ago
- A Splunk app to use MISP in background☆110Updated last month
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 10 months ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆86Updated 3 years ago
- ☆49Updated 4 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Miscelaneous Dockers☆46Updated 3 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆66Updated 4 years ago
- Log Entry to Sigma Rule Converter☆107Updated 3 years ago