theY4Kman / suricata-prettifierLinks
Command-line tool to format and syntax highlight Suricata rules
β13Updated 6 years ago
Alternatives and similar repositories for suricata-prettifier
Users that are interested in suricata-prettifier are comparing it to the libraries listed below
Sorting:
- π΄ The STIX2 Pattern expression parser for humansβ26Updated 6 years ago
- Parse Suricata rulesβ13Updated 2 years ago
- Suricata rule and intel indexβ33Updated last month
- A Python implementation of the Community ID flow hashing standardβ23Updated 2 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and auβ¦β84Updated this week
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout forβ¦β38Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stackβ16Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharingβ54Updated last week
- Modular command-line threat hunting tool & framework.β17Updated 5 years ago
- Pure python parser for Snort/Suricata rules.β33Updated last year
- snake-core - the real snakeβ15Updated 2 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglistsβ34Updated last week
- Zeek package for tracking long connections to report them before they have completed.β31Updated 2 weeks ago
- Carving tool based in Radare2 & Yaraβ16Updated 7 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearchβ19Updated 4 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)β107Updated last year
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.β159Updated 8 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .β67Updated 2 years ago
- A tool to convert Windows evtx files (Windows Event Log Files) into JSON format and log to Splunk (optional) using HTTP Event Collector.β58Updated 3 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP APIβ32Updated 5 years ago
- setup zeek, previously Bro IDSβ18Updated this week
- Find abuse contacts for observablesβ70Updated 3 years ago
- Serverless honeytoken π΅π»ββοΈβ81Updated 2 years ago
- β35Updated 4 years ago
- Wireshark plugin to display Suricata analysis infoβ95Updated 4 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; incluβ¦β41Updated 6 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.β21Updated 3 years ago
- Fun tools around the EBS Direct APIβ19Updated 4 years ago
- STIX 2 Fake Data Generatorβ11Updated last year
- Workflows for Shuffleβ24Updated 3 years ago