vishal1991 / Network-ForensicsLinks
• Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.
☆12Updated 10 years ago
Alternatives and similar repositories for Network-Forensics
Users that are interested in Network-Forensics are comparing it to the libraries listed below
Sorting:
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Updated 11 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 9 years ago
- Passive DNS V2☆60Updated 11 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Quickly generate snort rules for IOCs☆18Updated 9 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- PGT allows you to generate pcaps using python without touching the network in any way. It is dependent upon scapy.☆29Updated 3 years ago
- Industrial Control Systems Network Scanner☆23Updated 9 years ago
- A set of ICS IDS rules for use with Suricata.☆50Updated last year
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 5 years ago
- Evading Snort Intrusion Detection System.☆78Updated 3 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- scan-detection policies for bro☆16Updated 5 months ago
- Gather and compile open source threat intelligence feeds.☆40Updated 3 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Updated 7 years ago
- Top DNS Measurement for Bro☆11Updated 4 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15Updated 2 years ago
- ☆85Updated 11 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago