stratosphereips / StratosphereLinuxIPSLinks
Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors in the network traffic. Stratosphere Laboratory, AIC, FEL, CVUT in Prague.
☆836Updated last week
Alternatives and similar repositories for StratosphereLinuxIPS
Users that are interested in StratosphereLinuxIPS are comparing it to the libraries listed below
Sorting:
- Suricata, Snort and Zeek IDS rule and pcap testing system☆502Updated last month
- Scirius is a web application for Suricata ruleset management and threat hunting.☆666Updated last month
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,092Updated last week
- A Suricata based NDR distribution☆1,572Updated last month
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆436Updated this week
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,336Updated last year
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆448Updated last year
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆457Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,255Updated 3 weeks ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆470Updated last week
- Public datasets to help you address various cyber security problems.☆454Updated 3 years ago
- Your Everyday Threat Intelligence☆1,919Updated 2 months ago
- STIX data representing MITRE ATT&CK☆470Updated last week
- Cyber Analytics Repository☆964Updated 5 months ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆590Updated last week
- A set of Zeek scripts to detect ATT&CK techniques.☆611Updated last year
- The tool for updating your Suricata rules.☆280Updated 3 weeks ago
- A python module for working with ATT&CK☆613Updated last week
- Wazuh - Ruleset☆485Updated last year
- Extract and aggregate threat intelligence.☆882Updated last year
- A Suricata Docker image.☆302Updated 3 months ago
- Zeek-Formatted Threat Intelligence Feeds☆379Updated this week
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,500Updated 3 months ago
- Some results of my DGA reversing efforts☆679Updated last month
- Argus Sensor☆71Updated last week
- Indicators of Compromises (IOC) of our various investigations☆1,870Updated last week
- MITRE ATT&CK Website☆548Updated last week
- Super Next generation Advanced Reactive honEypot☆471Updated last year
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆188Updated 3 weeks ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆1,966Updated 2 months ago