thongsia / Public-Pcaps
☆48Updated 6 years ago
Alternatives and similar repositories for Public-Pcaps:
Users that are interested in Public-Pcaps are comparing it to the libraries listed below
- ☆44Updated last year
- The Security Analyst’s Guide to Suricata☆54Updated 8 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆34Updated 2 years ago
- Hands-On Network Forensics by Nipun Jaswal☆43Updated last year
- ☆48Updated 2 years ago
- Packet captures of malicious traffic for analysis using Wireshark☆57Updated last year
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated last year
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated 9 months ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆69Updated 8 months ago
- Re-play Adversarial Techniques☆29Updated 3 years ago
- A packet capture visualizer for industrial control networks.☆52Updated last year
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆40Updated 2 weeks ago
- ☆68Updated 6 months ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆30Updated 8 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆40Updated 6 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆23Updated last year
- Tools to interact with APTnotes reporting/index.☆99Updated 4 years ago
- A collection of resources for security data☆40Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 6 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated last week
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆33Updated 2 months ago
- Sample files for Control Things Platform☆38Updated 10 months ago
- Industrial Control Systems Network Protocol Parsers☆161Updated last month
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆24Updated last month
- Library of threat hunts to get any user started!☆42Updated 4 years ago
- Zeek Training Materials/Products☆37Updated 3 weeks ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago