stamparm / maltrailLinks
Malicious traffic detection system
☆7,065Updated this week
Alternatives and similar repositories for maltrail
Users that are interested in maltrail are comparing it to the libraries listed below
Sorting:
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,751Updated 3 weeks ago
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆4,767Updated 5 months ago
- The pattern matching swiss knife☆8,899Updated last month
- Open Source Vulnerability Management Platform☆5,512Updated last month
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,782Updated last week
- Loki - Simple IOC and YARA Scanner☆3,571Updated 7 months ago
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆6,996Updated this week
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,251Updated 2 months ago
- Repository of yara rules☆4,446Updated last year
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,090Updated 4 years ago
- An advanced memory forensics framework☆7,740Updated last month
- an awesome list of honeypot resources☆9,460Updated 3 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,737Updated 3 years ago
- Modern Honey Network☆2,459Updated 7 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,704Updated 5 years ago
- A swiss army knife for pentesting networks☆8,813Updated last year
- GRR Rapid Response: remote live forensics for incident response☆4,925Updated last month
- A curated list of awesome YARA rules, tools, and people.☆3,865Updated 3 months ago
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆6,696Updated this week
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,703Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,327Updated this week
- ☆3,630Updated last year
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆14,363Updated 3 months ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆3,783Updated last week
- A curated list of Awesome Threat Intelligence resources☆8,996Updated last month
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,280Updated 5 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,649Updated 5 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,273Updated 9 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,410Updated 2 weeks ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,757Updated last year