Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
☆7,561Apr 10, 2026Updated this week
Alternatives and similar repositories for zeek
Users that are interested in zeek are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,347Updated this week
- Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OIS…☆6,134Updated this week
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆5,019Mar 22, 2026Updated 3 weeks ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,944May 3, 2022Updated 3 years ago
- DEPRECATED - MozDef: Mozilla Enterprise Defense Platform☆2,168Nov 2, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- GRR Rapid Response: remote live forensics for incident response☆5,052Feb 16, 2026Updated last month
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,231Updated this week
- The pattern matching swiss knife☆9,526Feb 10, 2026Updated 2 months ago
- Snort++☆3,298Mar 18, 2026Updated 3 weeks ago
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.☆15,200Updated this week
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,738May 28, 2024Updated last year
- SQL powered operating system instrumentation, monitoring, and analytics.☆23,187Apr 2, 2026Updated last week
- Main Sigma Rule Repository☆10,279Apr 1, 2026Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Jan 12, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file s…☆3,035Updated this week
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,112Apr 16, 2021Updated 4 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,380Updated this week
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,896Jul 25, 2025Updated 8 months ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,541Updated this week
- Metasploit Framework☆37,850Apr 6, 2026Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,771Mar 30, 2026Updated last week
- Malicious traffic detection system☆8,371Updated this week
- Digging Deeper....☆3,889Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Six Degrees of Domain Admin☆10,534Mar 2, 2026Updated last month
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,502Jan 28, 2026Updated 2 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,999Apr 5, 2026Updated last week
- A Suricata based NDR distribution☆1,588Sep 13, 2025Updated 6 months ago
- OS X Auditor is a free Mac OS X computer forensics tool☆3,136Jul 27, 2020Updated 5 years ago
- Repository of yara rules☆4,748Apr 17, 2024Updated last year
- Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.☆1,937Feb 3, 2026Updated 2 months ago
- Automated Adversary Emulation Platform☆6,886Updated this week
- An advanced memory forensics framework☆7,989May 16, 2025Updated 10 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A curated list of Awesome Threat Intelligence resources☆10,041Jan 19, 2026Updated 2 months ago
- A curated list of tools for incident response☆8,931Jul 18, 2024Updated last year
- Loki - Simple IOC and YARA Scanner☆3,742Jan 12, 2026Updated 3 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,836Jan 19, 2020Updated 6 years ago
- Open Source Vulnerability Management Platform☆6,324Feb 13, 2026Updated last month
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 3 months ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆12,104Updated this week