shirkdog / pulledporkLinks
Pulled Pork for Snort and Suricata rule management (from Google code)
☆436Updated 4 years ago
Alternatives and similar repositories for pulledpork
Users that are interested in pulledpork are comparing it to the libraries listed below
Sorting:
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆352Updated last year
- Sguil client for NSM☆218Updated last year
- Scirius is a web application for Suricata ruleset management and threat hunting.☆656Updated 3 weeks ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆461Updated last month
- Automated deployment scripts for the RockNSM network hunting distribution.☆455Updated 2 years ago
- psad: Intrusion Detection and Log Analysis with iptables☆403Updated 2 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆946Updated 4 years ago
- Suricata Extreme Performance Tuning guide☆210Updated 7 years ago
- Passive Real-time Asset Detection System☆243Updated last year
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆282Updated last year
- Web Application Honeypot☆578Updated 11 months ago
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆228Updated 4 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- Super Next generation Advanced Reactive honEypot☆465Updated last year
- Wazuh - Ruleset☆454Updated 9 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆483Updated last month
- MozDef: The Mozilla Defense Platform☆68Updated 5 years ago
- OpenSOC Apache Hadoop Code☆579Updated 5 years ago
- a network packet capture compiler☆201Updated 3 years ago
- The tool for updating your Suricata rules.☆276Updated last week
- Open Source Tripwire®☆902Updated last year
- Snort + Barnyard2 + Pulledpork → The easy way!☆167Updated 4 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆797Updated 5 years ago
- Main MineMeld documentation repo☆380Updated 7 years ago
- Enterprise Log Search and Archive☆209Updated 6 years ago
- A low to medium interaction honeypot.☆468Updated last year
- virtual honeypots☆372Updated 2 years ago
- This repository contains Dockerfiles for building Docker images of popular malware analysis tools, which are distributed through the REMn…☆279Updated last year
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated 2 months ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago