shirkdog / pulledpork
Pulled Pork for Snort and Suricata rule management (from Google code)
☆424Updated 3 years ago
Alternatives and similar repositories for pulledpork:
Users that are interested in pulledpork are comparing it to the libraries listed below
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆350Updated 9 months ago
- Sguil client for NSM☆215Updated 10 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆638Updated last month
- Automated deployment scripts for the RockNSM network hunting distribution.☆448Updated last year
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆438Updated this week
- Suricata Extreme Performance Tuning guide☆205Updated 6 years ago
- Mirror of https://github.com/zeek/zeek☆169Updated last year
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- Snort + Barnyard2 + Pulledpork → The easy way!☆167Updated 3 years ago
- ** README ** This repo has MOVED to https://github.com/quadrantsec/sagan☆228Updated 3 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆465Updated 2 weeks ago
- Wazuh - Ruleset☆432Updated 4 months ago
- The tool for updating your Suricata rules.☆262Updated last month
- MozDef: The Mozilla Defense Platform☆67Updated 4 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆937Updated 3 years ago
- A Suricata based IDS/IPS/NSM distro☆1,503Updated 5 months ago
- Super Next generation Advanced Reactive honEypot☆454Updated 7 months ago
- Modular file scanning/analysis framework☆619Updated 5 years ago
- A low to medium interaction honeypot.☆462Updated 10 months ago
- OpenSOC Apache Hadoop Code☆575Updated 4 years ago
- Passive Real-time Asset Detection System☆233Updated 8 months ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,682Updated 8 months ago
- This repository contains Dockerfiles for building Docker images of popular malware analysis tools, which are distributed through the REMn…☆268Updated last year
- Snort FAQ☆116Updated 3 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆778Updated 4 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- psad: Intrusion Detection and Log Analysis with iptables☆392Updated last year
- Suricata IDS/IPS log analytics using the Elastic Stack.☆237Updated 3 years ago