sleetymattgeorge / SNORT-GUILinks
SNORT GUI: sniff sniffs the baddies and helps you setup SNORT ids in your network
☆28Updated 6 months ago
Alternatives and similar repositories for SNORT-GUI
Users that are interested in SNORT-GUI are comparing it to the libraries listed below
Sorting:
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆105Updated last year
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆58Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- The best tools and resources for forensic analysis.☆168Updated 2 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 3 years ago
- ☆69Updated 3 years ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆75Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- Writeups for Hack The Box machines/challenges☆25Updated 4 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆86Updated 5 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Updated 2 years ago
- Low Interaction Mobile Honeypot☆97Updated 7 months ago
- OS Command Injection Vulnerability Payload List☆54Updated 4 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orc…☆111Updated 3 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Updated 6 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆60Updated last year
- Small collection of Ransomware organized by family.☆270Updated last year
- Lightweight Bash Script To Automate Some Useful Information Gathering On IP Address Using Different API's☆26Updated 3 years ago
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆169Updated 3 years ago
- Simple Malware Scanner written in python☆91Updated 9 months ago
- Curated list of ransomware-related resources; awesome style.☆29Updated last year
- Capture screenshots of onion services on an onion service.☆73Updated last year
- A Network Automation framework focused on Cyber-Security☆46Updated 2 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆101Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆64Updated 2 years ago
- Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!☆179Updated 5 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆58Updated last month
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆22Updated 7 years ago
- Tools & Resources for Cyber Security Operations☆269Updated 8 months ago
- Darkweb Crawler Project☆208Updated last week