All Projects → Zeek-Network-Security-Monitor → Similar Projects or Alternatives

764 Open source projects that are alternatives of or similar to Zeek-Network-Security-Monitor

ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+7036.84%)
Ivre
Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+6034.21%)
Nfstream
NFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+1536.84%)
Zeek
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
Stars: ✭ 4,180 (+10900%)
Mutual labels:  pcap, bro, network-monitoring, zeek
zeek-docs
Documentation for Zeek
Stars: ✭ 41 (+7.89%)
Mutual labels:  pcap, bro, network-monitoring, zeek
network-tools
Network Tools
Stars: ✭ 27 (-28.95%)
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+15065.79%)
testmynids.org
A website and framework for testing NIDS detection
Stars: ✭ 55 (+44.74%)
pycommunityid
A Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (-52.63%)
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+60.53%)
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+18936.84%)
community-id-spec
An open standard for hashing network flows into identifiers, a.k.a "Community IDs".
Stars: ✭ 137 (+260.53%)
packet cafe
A platform built for easy-to-use automated network traffic analysis
Stars: ✭ 40 (+5.26%)
Poseidon
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict the type of device.
Stars: ✭ 310 (+715.79%)
Scapy
Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+18142.11%)
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+302.63%)
Mutual labels:  cybersecurity, cyber, cyber-security
CloudFrontier
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+168.42%)
Mutual labels:  cybersecurity, cyber-security
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+0%)
Mutual labels:  cybersecurity, cyber-security
arpwitch
A modern arpwatch replacement with JSON formatted outputs and easy options to exec commands when network changes are observed.
Stars: ✭ 20 (-47.37%)
Jxnet
Jxnet is a Java library for capturing and sending custom network packet buffers with no copies. Jxnet wraps a native packet capture library (libpcap/winpcap/npcap) via JNI (Java Native Interface).
Stars: ✭ 26 (-31.58%)
Bruteshark
Network Analysis Tool
Stars: ✭ 1,335 (+3413.16%)
Mutual labels:  pcap, network-analysis
cuc-wiki
个人教学 Wiki
Stars: ✭ 83 (+118.42%)
Mutual labels:  cybersecurity, cyber-security
brimcap
Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)
Stars: ✭ 22 (-42.11%)
Mutual labels:  pcap, zeek
graylog-plugin-netflow
[DEPRECATED] Graylog NetFlow plugin
Stars: ✭ 35 (-7.89%)
D1Proxy
A simple yet powerful Java 11 TCP MITM proxy for Dofus 1.29.1
Stars: ✭ 17 (-55.26%)
who and what to follow
Who and what to follow in the world of cyber security
Stars: ✭ 124 (+226.32%)
Mutual labels:  cybersecurity, cyber-security
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+268.42%)
Mutual labels:  cybersecurity, cyber-security
Joincap
Merge multiple pcap files together, gracefully.
Stars: ✭ 159 (+318.42%)
Mutual labels:  pcap, network-analysis
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (+10.53%)
Passer
Passive service locator, a python sniffer that identifies servers, clients, names and much more
Stars: ✭ 144 (+278.95%)
Mutual labels:  pcap, network-monitoring
CyberQueens
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩‍💻👨‍💻
Stars: ✭ 30 (-21.05%)
Mutual labels:  cybersecurity, cyber
d4-core
D4 core software (server and sample sensor client)
Stars: ✭ 40 (+5.26%)
masscanned
Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
Stars: ✭ 50 (+31.58%)
Packages
The default package source of the Zeek Package Manager
Stars: ✭ 94 (+147.37%)
Mutual labels:  pcap, network-monitoring
pcapdj
pcapdj - dispatch pcap files
Stars: ✭ 41 (+7.89%)
Mutual labels:  pcap, network-analysis
telemetry
Open-source datasets for anyone interested in working with network anomaly based machine learning, data science and research
Stars: ✭ 93 (+144.74%)
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+694.74%)
Mutual labels:  cybersecurity, cyber-security
MegaDev
Bro IDS + ELK Stack to detect and block data exfiltration
Stars: ✭ 46 (+21.05%)
Mutual labels:  bro, zeek
attack to veris
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (+47.37%)
opensnitch
OpenSnitch is a GNU/Linux application firewall
Stars: ✭ 398 (+947.37%)
mitreattack-python
A python module for working with ATT&CK
Stars: ✭ 208 (+447.37%)
NetworkAlarm
A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, credentials sent in-the-clear, and shellshock attacks. Currently supports live monitoring and network capture (pcap) scanning.
Stars: ✭ 17 (-55.26%)
Mutual labels:  pcap, network-monitoring
SuperLibrary
Information Security Library
Stars: ✭ 60 (+57.89%)
Mutual labels:  cybersecurity, network-security
attack-evals
ATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+50%)
mitrecnd.github.io
MITRE Shield website
Stars: ✭ 17 (-55.26%)
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+655.26%)
Mutual labels:  cybersecurity, cyber
URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+165.79%)
Mutual labels:  cybersecurity, cyber-security
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+128.95%)
Mutual labels:  cybersecurity, cyber-security
gsvsoc cirt-playbook-battle-cards
Cyber Incident Response Team Playbook Battle Cards
Stars: ✭ 142 (+273.68%)
PoW-Shield
Project dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (+160.53%)
Mutual labels:  cybersecurity, network-security
analyzer-d4-passivedns
A Passive DNS backend and collector
Stars: ✭ 26 (-31.58%)
attack-stix-data
STIX data representing MITRE ATT&CK
Stars: ✭ 118 (+210.53%)
ssldump
ssldump - (de-facto repository gathering patches around the cyberspace)
Stars: ✭ 160 (+321.05%)
firecracker
Stop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+1052.63%)
Mutual labels:  cybersecurity, cyber
graylog-zeek-content-pack
BRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to capture and index BRO/Zeek logs coming from a remote sensor.
Stars: ✭ 18 (-52.63%)
Mutual labels:  bro, zeek
BGP-Ranking
BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)
Stars: ✭ 49 (+28.95%)
network-pipeline
Network traffic data pipeline for real-time predictions and building datasets for deep neural networks
Stars: ✭ 36 (-5.26%)
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-42.11%)
flow-indexer
Flow-Indexer indexes flows found in chunked log files from bro,nfdump,syslog, or pcap files
Stars: ✭ 43 (+13.16%)
Mutual labels:  pcap, bro
cyberops
Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (-52.63%)
Mutual labels:  cybersecurity, cyber-security
1-60 of 764 similar projects