⭐ ⭐ Distributed tcpdump for cloud native environments ⭐ ⭐
-
Updated
Mar 27, 2024 - Go
⭐ ⭐ Distributed tcpdump for cloud native environments ⭐ ⭐
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
psad: Intrusion Detection and Log Analysis with iptables
Snort IDS/IPS log analytics using the Elastic Stack.
Network Tools
Development repository for the snort cookbook
Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, and rule types
Deploy pfelk with docker-compose
A website and framework for testing NIDS detection
The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat hunting rules.
aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based IDS (Intrusion Detection Systems) using these rules
Collection of Snort 2/3 rules.
Collection of Suricata rule sets that I use modified to my environments.
SNORT GUI: Your very own trusted blueteam forensic companion for SNORT IDS. OPTIMIZED, SECURE AND ABSOLUTELY FREE!
Add a description, image, and links to the snort topic page so that developers can more easily learn about it.
To associate your repository with the snort topic, visit your repo's landing page and select "manage topics."