stratosphereips / zeek_anomaly_detectorLinks
A completely automated anomaly detector Zeek network flows files (conn.log).
☆82Updated 5 months ago
Alternatives and similar repositories for zeek_anomaly_detector
Users that are interested in zeek_anomaly_detector are comparing it to the libraries listed below
Sorting:
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- ☆54Updated 2 years ago
- A collection of resources for security data☆41Updated 8 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Updated 2 years ago
- zeek-scripts☆45Updated 7 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated 2 years ago
- Zeek Training Materials/Products☆41Updated last month
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 4 years ago
- Definition, description and relationship types of MISP objects☆104Updated last week
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆124Updated 5 years ago
- Utility for parsing Bro log files into CSV or JSON format☆42Updated 3 years ago
- A tool to extract structured cyber information from incident reports.☆82Updated 7 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆178Updated 2 years ago
- Zeek support for Community ID flow hashing.☆37Updated 2 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆451Updated last year
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 5 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆50Updated 6 years ago
- ☆22Updated 3 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated last year
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 7 years ago
- Structured Threat Intelligence Graph☆98Updated 2 weeks ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆69Updated 2 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- ICS Cybersecurity PCAP respository☆62Updated 6 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 4 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆145Updated 5 years ago
- The Security Analyst’s Guide to Suricata☆61Updated 8 months ago
- ☆67Updated 7 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago