satta / awesome-suricata
A curated list of awesome things related to Suricata
☆153Updated last month
Alternatives and similar repositories for awesome-suricata:
Users that are interested in awesome-suricata are comparing it to the libraries listed below
- Suricata rules for network anomaly detection☆155Updated last week
- Zeek-Formatted Threat Intelligence Feeds☆347Updated this week
- SIEM Tactics, Techiques, and Procedures☆604Updated 3 weeks ago
- Standard-Format Threat Intelligence Feeds☆106Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆506Updated this week
- The Security Analyst’s Guide to Suricata☆53Updated 7 months ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆87Updated 2 years ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆168Updated last month
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆161Updated 2 months ago
- MISP Playbooks☆182Updated last week
- A curated list of awesome things related to TheHive & Cortex☆174Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆81Updated last month
- Open source endpoint agent providing host information to Zeek. [v2]☆72Updated 3 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆344Updated this week
- Import CrowdStrike Threat Intelligence into your instance of MISP☆42Updated 3 months ago
- Cyber Incident Response Team Playbook Battle Cards☆367Updated 8 months ago
- Rules generated from our investigations.☆191Updated 3 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆146Updated 4 months ago
- OpenCTI Docker deployment helpers☆168Updated this week
- Threat Hunting queries for various attacks☆223Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆232Updated last week
- Threat Intel Platform for T-POTs☆139Updated this week
- This project is a SIEM with SIRP and Threat Intel, all in one.☆419Updated 2 months ago
- Sigma rule specification☆120Updated 2 weeks ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- The Sigma command line interface based on pySigma☆142Updated last week
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆142Updated 4 months ago
- Resources To Learn And Understand SIGMA Rules☆173Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆154Updated 2 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆373Updated last week