thereisnotime / Snort-Rules
Collection of Snort 2/3 rules.
☆28Updated 6 years ago
Related projects: ⓘ
- A completely automated anomaly detector Zeek network flows files (conn.log).☆72Updated last month
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆32Updated 2 years ago
- ☆39Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆111Updated 10 months ago
- zeek-scripts☆40Updated 5 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆77Updated last year
- Suricata rules for network anomaly detection☆152Updated 3 weeks ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆60Updated last month
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆63Updated 4 months ago
- Repository of creating different example suricata data sets☆30Updated 5 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆47Updated 4 years ago
- ☆43Updated 2 years ago
- The Security Analyst’s Guide to Suricata☆49Updated 3 months ago
- Hands-On Network Forensics by Nipun Jaswal☆38Updated last year
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆105Updated 4 months ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆37Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆83Updated 2 years ago
- Awesome Cyber-Security Data-sets Collection☆18Updated 6 years ago
- Seamless Threat Intelligence Platform☆47Updated 7 months ago
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆153Updated last week
- Sample programs to access the API☆57Updated 2 months ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆98Updated 3 years ago
- Suricata Verification Tests - Testing Suricata Output☆99Updated this week
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆166Updated last year
- Collection of Suricata rule sets that I use modified to my environments.☆37Updated 4 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆94Updated last year
- Zeek Training Materials/Products☆34Updated 10 months ago
- Tool for managing Zeek deployments.☆53Updated last month
- Open source endpoint agent providing host information to Zeek. [v2]☆61Updated this week