bash_cata
Alert processor
Automates processing of network alerts from Suricata and adds IP addresses to MikroTik address lists.
A simple script that processes the generated Suricata eve-log in real time.
9 stars
1 watching
1 forks
Language: Shell
last commit: over 1 year ago
Linked from 1 awesome list
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Automates the deployment and updating of Suricata network intrusion detection system software. | 9 |
| | Templates for Kibana 6 to visualize and analyze Suricata threat intelligence data | 24 |
| | Automates importing threat intelligence data into Suricata's surveillance system | 37 |
| | A shell-based training environment for Suricata intrusion detection and analysis | 6 |
| | Automates incident response collection and processing on Linux hosts. | 274 |
| | A fast and extensible system for processing JSON events from security monitoring tools | 51 |
| | Customizable dashboards and visualizations for security monitoring and analysis using Suricata IDPS and the ELK stack. | 33 |
| | A utility that collects and reports system metrics to an MQTT broker. | 159 |
| | Automates scanning of HTTP resources in a target network using XML External Entity (XXE) attacks | 37 |
| | Provides a Suricata output to Kafka using the Eve plugin | 14 |
| | Detects malicious network and host activity using Yara, Snort, and ClamAV signatures. | 213 |
| | A Docker image for running Suricata, a network security system | 269 |
| | An analysis tool for packet capture files using Suricata and Zeek | 145 |
| | An implementation of the Language Server Protocol for Suricata signatures, adding syntax check and auto-completion to editors. | 66 |
| | A tool for inspecting and manipulating RabbitMQ message flows | 265 |