shirkdog / pulledporkLinks
Pulled Pork for Snort and Suricata rule management (from Google code)
☆442Updated 4 years ago
Alternatives and similar repositories for pulledpork
Users that are interested in pulledpork are comparing it to the libraries listed below
Sorting:
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆352Updated last year
- Sguil client for NSM☆221Updated last year
- Scirius is a web application for Suricata ruleset management and threat hunting.☆674Updated last month
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆481Updated this week
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆284Updated 6 months ago
- Suricata Extreme Performance Tuning guide☆213Updated 7 years ago
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆229Updated 4 years ago
- The tool for updating your Suricata rules.☆289Updated 2 months ago
- psad: Intrusion Detection and Log Analysis with iptables☆416Updated 2 years ago
- Snort + Barnyard2 + Pulledpork → The easy way!☆170Updated 4 years ago
- Snort FAQ☆118Updated 4 years ago
- Wazuh - Ruleset☆501Updated last year
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆946Updated 4 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆512Updated 2 weeks ago
- MozDef: The Mozilla Defense Platform☆68Updated 5 years ago
- A Simple QUEry and Report Tool☆142Updated 6 years ago
- The Python SDK for AlienVault OTX☆392Updated last year
- Tool to gather Threat Intelligence indicators from publicly available sources☆661Updated 6 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆545Updated 8 months ago
- Super Next generation Advanced Reactive honEypot☆472Updated last year
- Web Application Honeypot☆593Updated last year
- An analytical framework for network traffic and behavioral analytics☆456Updated 3 years ago
- Visualize network topologies and collect graph statistics based on pcap files☆355Updated 2 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Updated 8 years ago
- Passive Real-time Asset Detection System☆249Updated last year
- A low to medium interaction honeypot.☆473Updated last year
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆824Updated 5 years ago
- Main MineMeld documentation repo☆380Updated 8 years ago
- a network packet capture compiler☆205Updated 3 years ago