theY4Kman / suricata-prettifierLinks
Command-line tool to format and syntax highlight Suricata rules
β13Updated 5 years ago
Alternatives and similar repositories for suricata-prettifier
Users that are interested in suricata-prettifier are comparing it to the libraries listed below
Sorting:
- π΄ The STIX2 Pattern expression parser for humansβ26Updated 6 years ago
- Parse Suricata rulesβ13Updated 2 years ago
- A Python implementation of the Community ID flow hashing standardβ23Updated last year
- The Fastest way to consume Threat Intelβ26Updated 3 years ago
- snake-core - the real snakeβ15Updated 2 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearchβ19Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stackβ16Updated 4 years ago
- Generic Signature Format for SIEM Systemsβ14Updated 3 years ago
- setup zeek, previously Bro IDSβ18Updated last week
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout forβ¦β35Updated 3 years ago
- OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicatorsβ28Updated last year
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.β21Updated 3 years ago
- Kibana 6 Templates for Suricata IDPS Threat Huntingβ24Updated 6 years ago
- Suricata rule and intel indexβ31Updated last month
- Zeek package for tracking long connections to report them before they have completed.β31Updated last month
- A Yara Lua output script for Suricataβ20Updated 6 years ago
- Modular command-line threat hunting tool & framework.β17Updated 5 years ago
- An active domain name query tool to help keep track of domain name movements...β15Updated 4 years ago
- π Threat Bus β A threat intelligence dissemination layer for open-source security tools.β263Updated 2 years ago
- Wireshark plugin to display Suricata analysis infoβ95Updated 3 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.β16Updated 3 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; incluβ¦β41Updated 6 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.β59Updated 2 months ago
- Plugin providing native AF_Packet support for Zeek.β33Updated 2 weeks ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signaturesβ12Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata eventsβ18Updated 6 years ago
- Extract indicators of compromise from text, including "escaped" ones.β161Updated 5 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.β34Updated 6 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, Sβ¦β16Updated 4 years ago
- the fastest way to consume threat intelligence.β31Updated 2 years ago