Web service for scanning pcaps with snort
☆110Jul 4, 2018Updated 7 years ago
Alternatives and similar repositories for websnort
Users that are interested in websnort are comparing it to the libraries listed below
Sorting:
- Snort + Barnyard2 + Pulledpork → The easy way!☆170Mar 7, 2021Updated 4 years ago
- Snort + Pulledpork + Websnort in Docker!☆22Nov 9, 2021Updated 4 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆352Apr 11, 2024Updated last year
- Pulled Pork for Snort and Suricata rule management (from Google code)☆441Jul 7, 2021Updated 4 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆284Jul 10, 2025Updated 7 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆511Updated this week
- Queries to parse sysmon event log file with microsoft logparser☆58Mar 31, 2015Updated 10 years ago
- ☆173Jul 7, 2021Updated 4 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Jun 25, 2014Updated 11 years ago
- A Python script that generates Snort IDS rules from network packets☆24Oct 30, 2017Updated 8 years ago
- Honeypot deployment made easy☆237Mar 13, 2019Updated 6 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Sep 13, 2016Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- How to send structured Snort IDS alert logs into Graylog☆27Oct 20, 2025Updated 4 months ago
- Passive DNS V2☆60Mar 27, 2014Updated 11 years ago
- acunetix☆62Mar 27, 2020Updated 5 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆109Feb 8, 2017Updated 9 years ago
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 2 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- viewssld is a free, open source, non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort, and other Network Intrusion Detecti…☆74Aug 13, 2017Updated 8 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆87Jul 28, 2021Updated 4 years ago
- This repository contains tools used by 401trg.☆20Apr 14, 2021Updated 4 years ago
- Extract useful information from a Twitter account.☆35Jan 1, 2014Updated 12 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Oct 25, 2019Updated 6 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- An open source real-time network topology and protocols analyzer☆29Feb 22, 2017Updated 9 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- Detecting Lateral Movement with Machine Learning☆139Oct 31, 2017Updated 8 years ago
- add dpdk interface and packet processing to suricata in worker mode☆64Aug 7, 2020Updated 5 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 9 years ago