vishal1991 / Network-Forensics
• Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.
☆12Updated 10 years ago
Alternatives and similar repositories for Network-Forensics:
Users that are interested in Network-Forensics are comparing it to the libraries listed below
- Passive DNS V2☆61Updated 11 years ago
- Gather and compile open source threat intelligence feeds.☆39Updated 3 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Updated 11 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated last year
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Top DNS Measurement for Bro☆11Updated 4 years ago
- Quickly generate snort rules for IOCs☆18Updated 9 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- Contributed Bro Scripts☆30Updated 10 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- scan-detection policies for bro☆15Updated 2 months ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20Updated 7 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- ☆18Updated 6 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Maltese - Malware Traffic Emulator☆26Updated 8 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 4 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 9 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆44Updated 5 years ago