thongsia / Public-PcapsLinks
☆56Updated 6 years ago
Alternatives and similar repositories for Public-Pcaps
Users that are interested in Public-Pcaps are comparing it to the libraries listed below
Sorting:
- ☆54Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆61Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 6 months ago
- ☆53Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- Industrial Control Systems Network Protocol Parsers☆180Updated last month
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- The Security Analyst’s Guide to Suricata☆59Updated 5 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated 3 months ago
- Suricata rules for network anomaly detection☆173Updated 5 months ago
- Fast IOC and YARA Scanner☆83Updated 5 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 2 months ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆37Updated 10 months ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆85Updated last week
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 3 months ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago
- File analysis and management framework.☆88Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- ☆72Updated 6 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆97Updated this week
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- BlackBerry Threat Research & Intelligence☆99Updated last year
- Augmentation to Machine Readable CTI☆34Updated last month
- Graphical Realism Framework for Industrial Control Simulation (GRFICS) version 3☆44Updated 4 years ago
- Library of threat hunts to get any user started!☆45Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated last year
- An Adaptive Misuse Detection System☆44Updated 11 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated 2 years ago