All Projects → nsm-attack → Similar Projects or Alternatives

184 Open source projects that are alternatives of or similar to nsm-attack

S2AN
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
Stars: ✭ 70 (+32.08%)
Mutual labels:  suricata, mitre-attack, suricata-rules
connectors
OpenCTI connectors
Stars: ✭ 135 (+154.72%)
threat-intel
Signatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (+145.28%)
cycat-service
CyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-52.83%)
Misp Maltego
Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (+111.32%)
testmynids.org
A website and framework for testing NIDS detection
Stars: ✭ 55 (+3.77%)
Security Onion
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+5477.36%)
Mutual labels:  network-security-monitoring, nsm
attckr
⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-58.49%)
Elemental
Elemental - An ATT&CK Threat Library
Stars: ✭ 241 (+354.72%)
docker-suricata
A Suricata Docker image.
Stars: ✭ 120 (+126.42%)
Mutual labels:  suricata, nsm
sqhunter
A simple threat hunting tool based on osquery, Salt Open and Cymon API
Stars: ✭ 64 (+20.75%)
Mutual labels:  threat-intelligence
DPDK SURICATA-4 1 1
dpdk infrastructure for software acceleration. Currently working on RX and ACL pre-filter
Stars: ✭ 81 (+52.83%)
Mutual labels:  suricata
altprobe
collector for XDR and security posture service
Stars: ✭ 62 (+16.98%)
Mutual labels:  suricata
examples
Network Service Mesh examples repo
Stars: ✭ 14 (-73.58%)
Mutual labels:  nsm
community-id-spec
An open standard for hashing network flows into identifiers, a.k.a "Community IDs".
Stars: ✭ 137 (+158.49%)
misp-takedown
A curses-style interface for automatic takedown notification based on MISP events.
Stars: ✭ 19 (-64.15%)
Mutual labels:  threat-intelligence
Azure-Sentinel-4-SecOps
Microsoft Sentinel SOC Operations
Stars: ✭ 140 (+164.15%)
Mutual labels:  threat-intelligence
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-45.28%)
Mutual labels:  threat-intelligence
TheBriarPatch
An extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-60.38%)
Mutual labels:  suricata
SIGMA-detection-rules
Set of SIGMA rules (>250) mapped to MITRE Att@k tactic and techniques
Stars: ✭ 97 (+83.02%)
Mutual labels:  mitre-attack
S1EM
This project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (+409.43%)
Mutual labels:  suricata
rstthreats
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-67.92%)
Mutual labels:  threat-intelligence
ayashige
Ayashige provides a list of suspicious newly updated domains as a JSON feed
Stars: ✭ 27 (-49.06%)
Mutual labels:  threat-intelligence
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (+32.08%)
Mutual labels:  threat-intelligence
ELK-Hunting
Threat Hunting with ELK Workshop (InfoSecWorld 2017)
Stars: ✭ 58 (+9.43%)
Mutual labels:  nsm
kubescape
Kubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
Stars: ✭ 7,340 (+13749.06%)
Mutual labels:  mitre-attack
TwiTi
This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)
Stars: ✭ 120 (+126.42%)
Mutual labels:  threat-intelligence
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+303.77%)
Mutual labels:  threat-intelligence
IronNetTR
Threat research and reporting from IronNet's Threat Research Teams
Stars: ✭ 36 (-32.08%)
Mutual labels:  threat-intelligence
FireHOL-IP-Aggregator
Application for keeping feeds from FireHOL https://github.com/firehol/blocklist-ipsets with IP addresses appearance history. HTTP-based API service is developed for search requests.
Stars: ✭ 26 (-50.94%)
Mutual labels:  threat-intelligence
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+32.08%)
Mutual labels:  threat-intelligence
MindMaps
#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+322.64%)
Mutual labels:  threat-intelligence
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-58.49%)
Mutual labels:  threat-intelligence
Phishruffus
Intelligent threat hunter and phishing servers
Stars: ✭ 44 (-16.98%)
Mutual labels:  threat-intelligence
gonids
gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (+164.15%)
Mutual labels:  suricata
awesome-malware-analysis
Defund the Police.
Stars: ✭ 9,181 (+17222.64%)
Mutual labels:  threat-intelligence
ansible
Ansible playbook automation for pfelk
Stars: ✭ 23 (-56.6%)
Mutual labels:  suricata
vagrant-ids
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-60.38%)
Mutual labels:  suricata
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+49.06%)
Mutual labels:  threat-intelligence
rdppot
RDP honeypot
Stars: ✭ 55 (+3.77%)
Mutual labels:  suricata
SSHapendoes
Capture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-41.51%)
Mutual labels:  threat-intelligence
pybinaryedge
Python 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/
Stars: ✭ 16 (-69.81%)
Mutual labels:  threat-intelligence
malware-persistence
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+105.66%)
Mutual labels:  threat-intelligence
client-python
OpenCTI Python Client
Stars: ✭ 45 (-15.09%)
Mutual labels:  threat-intelligence
docker-misp
A (nearly) production ready Dockered MISP
Stars: ✭ 184 (+247.17%)
Mutual labels:  threat-intelligence
ThreatIntelligence
Tracking APT IOCs
Stars: ✭ 23 (-56.6%)
Mutual labels:  threat-intelligence
intelligence-icons
intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
Stars: ✭ 32 (-39.62%)
Mutual labels:  threat-intelligence
brimcap
Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)
Stars: ✭ 22 (-58.49%)
Mutual labels:  suricata
balboa
server for indexing and querying passive DNS observations
Stars: ✭ 42 (-20.75%)
Mutual labels:  suricata
AWS-Mirror-Toolkit
A set of tools and procedures for automating NSM and NIDS deployments in AWS
Stars: ✭ 16 (-69.81%)
Scrummage
The Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (+569.81%)
Mutual labels:  threat-intelligence
attack to veris
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (+5.66%)
Mutual labels:  mitre-attack
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1175.47%)
Mutual labels:  threat-intelligence
mitreattack-python
A python module for working with ATT&CK
Stars: ✭ 208 (+292.45%)
Mutual labels:  mitre-attack
best-practices-in-threat-intelligence
Best practices in threat intelligence
Stars: ✭ 38 (-28.3%)
Mutual labels:  threat-intelligence
mitrecnd.github.io
MITRE Shield website
Stars: ✭ 17 (-67.92%)
Mutual labels:  mitre-attack
pcapdj
pcapdj - dispatch pcap files
Stars: ✭ 41 (-22.64%)
Mutual labels:  suricata
misp-osint-collection
Collection of best practices to add OSINT into MISP and/or MISP communities
Stars: ✭ 54 (+1.89%)
Mutual labels:  threat-intelligence
coronavirus-covid-19-SARS-CoV-2-IoCs
All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns
Stars: ✭ 67 (+26.42%)
Mutual labels:  threat-intelligence
zeek-docs
Documentation for Zeek
Stars: ✭ 41 (-22.64%)
Mutual labels:  nsm
1-60 of 184 similar projects