stratosphereips / zeek_anomaly_detector
A completely automated anomaly detector Zeek network flows files (conn.log).
☆77Updated 8 months ago
Alternatives and similar repositories for zeek_anomaly_detector:
Users that are interested in zeek_anomaly_detector are comparing it to the libraries listed below
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- ☆103Updated 4 years ago
- zeek-scripts☆44Updated 6 years ago
- A collection of resources for security data☆41Updated 7 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆119Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 9 months ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 7 months ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆101Updated 3 years ago
- ☆35Updated 2 weeks ago
- Zeek Training Materials/Products☆37Updated last month
- A utility repo to assist with converting between MISP and STIX formats☆68Updated 4 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆75Updated 7 years ago
- ICS Cybersecurity PCAP respository☆52Updated 6 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆19Updated 6 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- The FASTEST way to consume threat intel.☆68Updated last year
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆47Updated 10 months ago
- Graphics, icons, and diagrams to support STIX 2☆46Updated 3 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 9 months ago
- ☆49Updated 6 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated 4 months ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆55Updated 4 years ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆147Updated this week
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆164Updated last year
- Wireshark plugin to display Suricata analysis info☆93Updated 3 years ago