thongsia / Public-PcapsLinks
☆68Updated 7 years ago
Alternatives and similar repositories for Public-Pcaps
Users that are interested in Public-Pcaps are comparing it to the libraries listed below
Sorting:
- ☆54Updated 2 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆64Updated 2 years ago
- Industrial Control Systems Network Protocol Parsers☆188Updated 4 months ago
- The Security Analyst’s Guide to Suricata☆61Updated 9 months ago
- ☆57Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 5 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆162Updated 10 months ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆145Updated 5 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 months ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆91Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆107Updated last year
- A packet capture visualizer for industrial control networks.☆55Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Updated 2 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 7 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Suricata rules for network anomaly detection☆182Updated 2 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Augmentation to Machine Readable CTI☆37Updated 4 months ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆37Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 9 months ago
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆89Updated last week
- An awesome list of resources on deception-based security with honeypots and honeytokens☆180Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆191Updated last month
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 8 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Updated 2 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆84Updated last month
- Cyber Threat Intelligence Data, Indicators, and Analysis☆107Updated last week
- Hands-On Network Forensics by Nipun Jaswal☆62Updated 2 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆179Updated 2 years ago