vijaykeswani / Network-Topology-DiscoveryLinks
Real time graph generator of the network topology using traceroute, nmap and arborJS
☆12Updated 11 years ago
Alternatives and similar repositories for Network-Topology-Discovery
Users that are interested in Network-Topology-Discovery are comparing it to the libraries listed below
Sorting:
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- ☆35Updated 4 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆39Updated 7 years ago
- Look into EDR events from network☆23Updated 2 months ago
- Community-based CybergON-powered Suricata rules☆12Updated 3 years ago
- ☆48Updated last week
- ☆20Updated 5 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆16Updated 3 years ago
- ☆47Updated 12 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- ☆11Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- This repo contains information on how to auto deploy Sysmon via GPO and Task Scheduler☆12Updated 3 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆34Updated last year
- Our collection of Wazuh detection rules for our Offense Lab☆15Updated 3 years ago
- Create a windows Active Directory lab☆16Updated 5 years ago
- tshark + ELK analytics virtual machine☆67Updated 5 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year