shirkdog / pulledporkLinks
Pulled Pork for Snort and Suricata rule management (from Google code)
☆442Updated 4 years ago
Alternatives and similar repositories for pulledpork
Users that are interested in pulledpork are comparing it to the libraries listed below
Sorting:
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆354Updated last year
- Sguil client for NSM☆222Updated last year
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆475Updated 2 weeks ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆669Updated 3 months ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago
- psad: Intrusion Detection and Log Analysis with iptables☆416Updated 2 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆283Updated 5 months ago
- Suricata Extreme Performance Tuning guide☆214Updated 7 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆945Updated 4 years ago
- Super Next generation Advanced Reactive honEypot☆474Updated last year
- A Simple QUEry and Report Tool☆142Updated 6 years ago
- Web Application Honeypot☆594Updated last year
- The tool for updating your Suricata rules.☆284Updated last month
- Snort + Barnyard2 + Pulledpork → The easy way!☆169Updated 4 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆508Updated last week
- DEPRECATED - USE v3 (bearded-avenger)☆229Updated 7 years ago
- Wazuh - Ruleset☆495Updated last year
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆229Updated 4 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆659Updated 6 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆508Updated 3 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆471Updated 6 years ago
- DPS' Lightweight Investigation Notebook☆434Updated last year
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆543Updated 7 months ago
- A low to medium interaction honeypot.☆474Updated last year
- MozDef: The Mozilla Defense Platform☆68Updated 5 years ago
- An any-snarf program that processes application protocols (HTTP/FTP/...) from tcpdump or snoop files and stores session and file data☆234Updated 4 years ago
- OSSEC Documentation☆138Updated 10 months ago
- Snort FAQ☆117Updated 4 years ago
- Passive Real-time Asset Detection System☆249Updated last year
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆818Updated 5 years ago