zeek / zeek-trainingLinks
Zeek Training Materials/Products
☆40Updated 3 weeks ago
Alternatives and similar repositories for zeek-training
Users that are interested in zeek-training are comparing it to the libraries listed below
Sorting:
- Zeek support for Community ID flow hashing.☆37Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- Plugin providing native AF_Packet support for Zeek.☆33Updated 2 months ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 4 years ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- zeek-scripts☆45Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 4 months ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆107Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Updated 5 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆104Updated 2 years ago
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆30Updated last month
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- Docker files for building Zeek.☆88Updated 2 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 5 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆190Updated 4 years ago
- Run zeek with zeekctl in docker☆61Updated last year
- This program exports MITRE ATT&CK framework in ELK dashboard☆80Updated 3 years ago
- Home for Splunk security datasets.☆126Updated 5 years ago
- Log4j Exploit Detection Logic for Zeek☆19Updated last month
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆37Updated 11 months ago
- ☆224Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- ☆37Updated 5 years ago
- The Security Analyst’s Guide to Suricata☆61Updated 8 months ago
- Bro/Zeek integration with osquery☆94Updated 5 years ago