network-security-monitoring
There are 40 repositories under network-security-monitoring topic.
Security-Onion-Solutions/security-onion
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
rafael-santiago/pig
A Linux packet crafting tool.
codeexpress/respounder
Respounder detects presence of responder in the network.
corelight/community-id-spec
An open standard for hashing network flows into identifiers, a.k.a "Community IDs".
0xtf/nsm-attack
Mapping NSM rules to MITRE ATT&CK
mytechnotalent/Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
0xtf/testmynids.org
A website and framework for testing NIDS detection
tatsuiman/rpot2
Real-time Packet Observation Tool
3CORESec/AWS-AutoMirror
Automation of VPC Traffic Mirror Sessions in AWS
edoardottt/boggart
Highly customizable low-interaction experimental honeypot that mimics specific hosts.
jxnet/Jxnet
Jxnet is a Java library for capturing and sending custom network packet buffers with no copies. Jxnet wraps a native packet capture library (libpcap/winpcap/npcap) via JNI (Java Native Interface).
corelight/pycommunityid
A Python implementation of the Community ID flow hashing standard
alonecoder1337/Dos-Attack-Detection-using-Machine-Learning
A machine learning program, that detects denial of service attack using machine learning technique.
satta/gommunityid
Go implementation of the Community ID flow hashing standard
3CORESec/AWS-Mirror-Toolkit
A set of tools and procedures for automating NSM and NIDS deployments in AWS
Truvis/Splunk_TA_Truvis_Suricata5
This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup a Suricata Port Mirrored Server
imsiddhant/Palo-Alto-Networks-Cybersecurity-Specialization
This repository shows all the hands on experience on Palo Alto Firewall, assignment and projects I have done in My Palo Alto Specialization Journey.
0snap/broker-application-templates
Templates for writing applications using Zeek NSM communication library Broker
diveyez/fw.sh
Linux Network Defense Scripting (BASH)
3CORESec/AWS-TMS-Remover
Automate the deletion of AWS VPC Traffic Mirror Sessions
vrikodar/Wizard
A Full Fledged iptables Firewall automation framework For Linux with Log monitoring..
githubfoam/zeek-sandbox
zeek network security monitoring NIDS HIDS
jsutch/RITA_Scripts
Scripts and Notebooks for doing IDS analysis of Zeek/RITA outputs
tsikerdekis/overnight-hercules-network-security
Overnight Hercules for Network Security: Become a Security Analyst book
3CORESec/AWS-Config-MirrorSession
Check compliance of EC2 instances for session mirroring
adkauf/nmap-mon
Automated monitoring and alerting for network changes
ArcticDev78/netsploit-py
Use nmap and other network tools easily and efficiently
githubfoam/suricata-sandbox
network security monitoring NIDS HIDS CTI DFIR
tristanluther28/network_security_project
ECE 478 Client Fingerprinting Techniques
7elmie/CCNA-3-Lab-S-4-U
This a Full CCNA 3 Lab'S Ans From the Start To the End and More Can You Comment in that or edit to more since or information about that field or any update or upgrade about that Lab'S
decompile/community-id-dotnet-core
A C# .net core implementation of the Community ID flow hashing standard
lanl/rhelhostinfo
Use the host-as-sensor model to enumerate security-relevant information about a RHEL host and the surrounding network, identifying and reporting changes via syslog. Written in python3.
githubfoam/k8s-ebpf-sandbox
kubernetes ebpf
githubfoam/openvas-sandbox
openvas network security monitoring NIDS HIDS
tsikerdekis/overnight-hercules-network-security-opensearch-image
Overnight Hercules for Network Security: Become a Security Analyst - NSM Opensearch Image
wahaj/Snort-IDS
A detailed basic setup config for the GNS3 Virtual Machine. This config aims to setup a software-based Intrusion Detection System with the highly popular software IDS "Snort"