collection of bro and bash scripts that when run from the same directory on Linux distro with bro installed, will pull information such as active HTTP conns, FTP conns, etc. It also carves various types of files at the same time. They can be run against snort logs or pcaps
☆12Mar 29, 2016Updated 9 years ago
Alternatives and similar repositories for Bro-NetworkSecurityMonitoring
Users that are interested in Bro-NetworkSecurityMonitoring are comparing it to the libraries listed below
Sorting:
- Assorted scripts for Bro☆12Feb 8, 2016Updated 10 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- A collection of bro_scripts and signatures☆27Jun 26, 2019Updated 6 years ago
- Bro stuff.☆12May 24, 2016Updated 9 years ago
- Experimental Bro scripts with good prospects for the official bro-scripts repository.☆20Nov 2, 2017Updated 8 years ago
- Utilities and scripts for bro-ids☆23Jan 6, 2014Updated 12 years ago
- ☆24Jan 19, 2020Updated 6 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Various Bro scripts☆37May 20, 2014Updated 11 years ago
- Contributed Bro Scripts☆30May 28, 2014Updated 11 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆51Feb 11, 2014Updated 12 years ago
- A collection of Bro scripts I've written☆41Jun 5, 2015Updated 10 years ago
- Various Bro scripts☆96Jul 8, 2016Updated 9 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- ☆11Jul 19, 2021Updated 4 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Ultimate List Of Bug Bounty Tools☆10Feb 25, 2023Updated 3 years ago
- Implementation of a Whois Server with a redis backend☆15Oct 31, 2010Updated 15 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Hacking the HooToo HT-TM05☆12Dec 22, 2022Updated 3 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- CVE-2021-22205 RCE☆13Jul 4, 2022Updated 3 years ago
- A Python module for Palo Alto Networks' WildFire API☆11Feb 18, 2020Updated 6 years ago
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Bro scripts to monitor for new hosts within a subnet range that aren't whitelisted/vetted.☆13Jun 28, 2013Updated 12 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- top usernames from azure survey 2025☆14Apr 25, 2025Updated 10 months ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- An updated version Lady Ada's Wavebubble☆11May 30, 2013Updated 12 years ago
- Monitor Linux Server CPU Utilization and Get Alerts and also Store Historical CPU Usage Data in Log File.☆16Jan 16, 2019Updated 7 years ago