treussart / ProbeManagerLinks
Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...
☆72Updated 6 years ago
Alternatives and similar repositories for ProbeManager
Users that are interested in ProbeManager are comparing it to the libraries listed below
Sorting:
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- The Seeker of IOC☆129Updated 4 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 9 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆80Updated 9 years ago
- ☆61Updated 7 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- ☆59Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 6 months ago
- Vulnerability Data in ES☆146Updated 7 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 4 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 7 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 2 months ago