tedsluis / nmapLinks
scan & visualize subnets
☆70Updated 8 years ago
Alternatives and similar repositories for nmap
Users that are interested in nmap are comparing it to the libraries listed below
Sorting:
- Snort IDS/IPS log analytics using the Elastic Stack.☆86Updated 3 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆110Updated last year
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆106Updated last year
- How to send structured Snort IDS alert logs into Graylog☆27Updated last year
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- tshark + ELK analytics virtual machine☆67Updated 4 months ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆34Updated 5 months ago
- Wazuh - Splunk App☆55Updated 9 months ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- collector/runner☆65Updated 3 months ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆41Updated 2 years ago
- automate your MISP installs☆68Updated 4 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆154Updated last year
- A tool for analyzing firewall rules☆156Updated 7 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆109Updated 5 months ago
- Passive DNS collection using Zeek☆182Updated 2 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆16Updated 3 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆61Updated 10 months ago
- ☆23Updated 5 years ago
- Tool for managing Zeek deployments.☆56Updated 3 weeks ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆225Updated 9 years ago
- An open source real-time network topology and protocols analyzer☆29Updated 8 years ago
- OwlH Master API☆24Updated 2 months ago