robcowart / synesis_lite_suricataLinks
Suricata IDS/IPS log analytics using the Elastic Stack.
☆239Updated 4 years ago
Alternatives and similar repositories for synesis_lite_suricata
Users that are interested in synesis_lite_suricata are comparing it to the libraries listed below
Sorting:
- Scirius is a web application for Suricata ruleset management and threat hunting.☆657Updated last month
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆461Updated this week
- The tool for updating your Suricata rules.☆277Updated 2 weeks ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆86Updated 4 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆483Updated 2 weeks ago
- Wazuh - Ruleset☆463Updated 10 months ago
- Security event correlation engine for ELK stack☆440Updated last year
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆282Updated 3 weeks ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Passive Real-time Asset Detection System☆244Updated last year
- Suricata Extreme Performance Tuning guide☆211Updated 7 years ago
- A Suricata Docker image.☆291Updated 2 weeks ago
- Suricata Extreme Performance Tuning guide - Mark II☆118Updated 7 years ago
- Plugins for Wazuh Dashboard☆479Updated this week
- Open Source Security Information and event Management☆98Updated 9 years ago
- Suricata rules for network anomaly detection☆167Updated 3 months ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆111Updated last year
- A Suricata based IDS/IPS/NSM distro☆1,554Updated 11 months ago
- Greenbone Vulnerability Management Docker Image with OpenVAS☆250Updated 8 months ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆800Updated 5 years ago
- a network packet capture compiler☆201Updated 3 years ago
- Create actionable data from your Vulnerability Scans☆1,389Updated 2 years ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Rule sets for Sagan☆105Updated 4 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆439Updated last year
- A Zeek log writer plugin that publishes to Kafka.☆49Updated this week
- A Search command to explore Elasticsearch data within Splunk.☆40Updated 6 years ago
- Suricata Verification Tests - Testing Suricata Output☆112Updated 2 weeks ago
- Alienvault ossim☆123Updated 5 months ago
- Suricata rules for the new critical vulnerabilities☆83Updated 4 years ago