zam89 / suricatalogparser
A simple log parser for Suricata log file (JSON)
☆8Updated 2 years ago
Alternatives and similar repositories for suricatalogparser
Users that are interested in suricatalogparser are comparing it to the libraries listed below
Sorting:
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- ☆14Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 5 years ago
- ☆13Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆17Updated this week
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- PowerShell version of Fail2Ban☆12Updated 5 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 4 years ago
- Cisco AMP threat hunting scripts☆14Updated 6 months ago
- Phactive - Monitoring an Environment with Nmap red teaming☆13Updated 6 years ago
- ☆33Updated 3 months ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- THOR MITRE ATT&CK Framework Coverage☆24Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated this week
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 7 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- Triage automation for suspect URLs☆13Updated 5 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Updated 6 years ago