⭐ ⭐ Distributed tcpdump for cloud native environments ⭐ ⭐
-
Updated
Jul 1, 2024 - Go
⭐ ⭐ Distributed tcpdump for cloud native environments ⭐ ⭐
psad: Intrusion Detection and Log Analysis with iptables
A website and framework for testing NIDS detection
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat hunting rules.
Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, and rule types
Snort IDS/IPS log analytics using the Elastic Stack.
A website and framework for testing NIDS detection
Deploy pfelk with docker-compose
Collection of Suricata rule sets that I use modified to my environments.
Collection of Snort 2/3 rules.
Network Tools
This is an open source Snort rules repository
SNORT GUI: sniff sniffs the baddies and helps you setup SNORT ids in your network
Add a description, image, and links to the snort topic page so that developers can more easily learn about it.
To associate your repository with the snort topic, visit your repo's landing page and select "manage topics."