sleetymattgeorge / SNORT-GUILinks
SNORT GUI: sniff sniffs the baddies and helps you setup SNORT ids in your network
☆25Updated 2 weeks ago
Alternatives and similar repositories for SNORT-GUI
Users that are interested in SNORT-GUI are comparing it to the libraries listed below
Sorting:
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆97Updated last year
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆46Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆33Updated 2 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆13Updated 9 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆49Updated last year
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- An Interface for AI built for cybersecurity professionals☆91Updated 4 months ago
- Packet captures of malicious traffic for analysis using Wireshark☆59Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- ☆77Updated 2 years ago
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆38Updated last year
- A CALDERA Plugin Template☆19Updated last year
- This project implements a cybersecurity system for detecting anomalies and intrusions in network traffic. It utilizes machine learning mo…☆16Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Multithread reverse shell listener☆25Updated last year
- ☆19Updated last year
- Honeyscanner: A vulnerability analyzer for honeypots☆43Updated 10 months ago
- ☆12Updated 2 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆51Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated 2 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆45Updated 2 months ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆63Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆31Updated 4 months ago