zeek / zeek-docs
Documentation for Zeek
☆50Updated this week
Related projects ⓘ
Alternatives and complementary repositories for zeek-docs
- Best practices in threat intelligence☆46Updated 2 years ago
- Zeek support for Community ID flow hashing.☆34Updated last year
- Zeek package for tracking long connections to report them before they have completed.☆29Updated 2 years ago
- Plugin for Zeek/Bro which provides http2 decoder/analyzer☆30Updated 5 months ago
- Specifications used in the MISP project including MISP core format☆46Updated last month
- Tool for managing Zeek deployments.☆53Updated 3 months ago
- A Spicy protocol analyzer for WireGuard☆28Updated 4 years ago
- Log Entry to Sigma Rule Converter☆105Updated 2 years ago
- Zeek Training Materials/Products☆35Updated last month
- A collection of notebooks built for defensive and offensive operations.☆76Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- ☆34Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆107Updated 4 years ago
- The default package source of the Zeek Package Manager. Wrote a package? See the README for how to get it included.☆130Updated this week
- A Python implementation of the Community ID flow hashing standard☆23Updated 11 months ago
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆28Updated 11 months ago
- A RESTful API frontend for Stenographer☆55Updated last year
- Bro/Zeek integration with osquery☆95Updated 4 years ago
- Community driven repository of Playbooks and Apps for ThreatConnect.☆69Updated 3 months ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 2 weeks ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- A website and framework for testing NIDS detection☆56Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Salt States for Configuring the SIFT Workstation☆96Updated this week
- Threat Alert Logic Repository☆89Updated 5 years ago
- The FASTEST way to consume threat intel.☆64Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆57Updated 5 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- Definition, description and relationship types of MISP objects☆91Updated last week