feverfast, extensible, versatile event router for Suricata's EVE-JSON format
Stars: ✭ 47 (-83.57%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (-28.32%)
Suricata UpdateThe tool for updating your Suricata rules.
Stars: ✭ 143 (-50%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-92.66%)
Suricata RulesSuricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等
Stars: ✭ 397 (+38.81%)
SelksA Suricata based IDS/IPS distro
Stars: ✭ 707 (+147.2%)
gonidsgonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (-51.05%)
TNSR IDSIDS using a port mirror, Snort and an alert -> RESTCONF utility
Stars: ✭ 30 (-89.51%)
ProbeManagerCentralize Management of Intrusion Detection System like Suricata Bro Ossec ...
Stars: ✭ 73 (-74.48%)
ML-IDSAn IDS implementation using machine learning
Stars: ✭ 30 (-89.51%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-73.78%)
Remote-Integrity-ToolThe DearBytes remote integrity tool is an IDS (Intrusion Detection System) that keeps track of files on a remote server and logs an event if a file gets added, removed or modified.
Stars: ✭ 12 (-95.8%)
Home-LabThis is the network diagrams, configuration guides, and hardware used for my home lab.
Stars: ✭ 62 (-78.32%)
wazuh-packagesWazuh - Tools for packages creation
Stars: ✭ 54 (-81.12%)
S1EMThis project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (-5.59%)
hashids.pmHashids, ported for Perl
Stars: ✭ 15 (-94.76%)
nsm-attackMapping NSM rules to MITRE ATT&CK
Stars: ✭ 53 (-81.47%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-84.27%)
IPRadar2Real-time detection and defense against malicious network activity and policy violations (exploits, port-scanners, advertising, telemetry, state surveillance, etc.)
Stars: ✭ 20 (-93.01%)
firewall-controllerA kubernetes controller running on bare-metal firewalls, creating nftables rules, configures suricata, collects network metrics
Stars: ✭ 37 (-87.06%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-78.67%)
S2ANS2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
Stars: ✭ 70 (-75.52%)
prickly-peteA script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
Stars: ✭ 29 (-89.86%)
DPDK SURICATA-4 1 1dpdk infrastructure for software acceleration. Currently working on RX and ACL pre-filter
Stars: ✭ 81 (-71.68%)
h1-searchTool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (-79.72%)
youtube-playlist❄️ Extract links, ids, and names from a youtube playlist
Stars: ✭ 73 (-74.48%)
brimcapConvert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)
Stars: ✭ 22 (-92.31%)
rdppotRDP honeypot
Stars: ✭ 55 (-80.77%)
edgeApplication-embedded connectivity and zero-trust components
Stars: ✭ 44 (-84.62%)
avainA Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (-80.42%)
harshHashids implementation in Rust
Stars: ✭ 48 (-83.22%)
ansibleAnsible playbook automation for pfelk
Stars: ✭ 23 (-91.96%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-92.66%)
shortidSuper short, fully unique, non-sequential and URL-friendly Ids
Stars: ✭ 20 (-93.01%)
FragscapyFragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multiple successive tests to determine which options can be used to evade firewalls and IDS.
Stars: ✭ 52 (-81.82%)
ScoutScout - a Contactless Active Reconnaissance Tool
Stars: ✭ 48 (-83.22%)
Sysmon ConfigSysmon configuration file template with default high-quality event tracing
Stars: ✭ 3,287 (+1049.3%)
pcapdjpcapdj - dispatch pcap files
Stars: ✭ 41 (-85.66%)
UTMFWUTM Firewall on OpenBSD
Stars: ✭ 104 (-63.64%)
eewidsEasily Expandable Wireless Intrusion Detection System
Stars: ✭ 25 (-91.26%)
altprobecollector for XDR and security posture service
Stars: ✭ 62 (-78.32%)
moleYara powered NIDS with high speed packet capture powered by PF_RING
Stars: ✭ 51 (-82.17%)
Sagan** README ** This repo has MOVED to https://github.com/quadrantsec/sagan
Stars: ✭ 236 (-17.48%)
evtx-hunterevtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
Stars: ✭ 122 (-57.34%)
balboaserver for indexing and querying passive DNS observations
Stars: ✭ 42 (-85.31%)
Wazuh DockerWazuh - Docker containers
Stars: ✭ 213 (-25.52%)
graylog-zeek-content-packBRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to capture and index BRO/Zeek logs coming from a remote sensor.
Stars: ✭ 18 (-93.71%)
ScanrDetect x86 shellcode in files and traffic.
Stars: ✭ 16 (-94.41%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (-26.92%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+933.57%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (-89.16%)
dexIoT device indexer and search engine.
Stars: ✭ 53 (-81.47%)