bash_cata
Alert processor
Automates processing of network alerts from Suricata and adds IP addresses to MikroTik address lists.
A simple script that processes the generated Suricata eve-log in real time.
9 stars
1 watching
1 forks
Language: Shell
last commit: 11 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| Automates the deployment and updating of Suricata network intrusion detection system software. | 9 |
| Templates for Kibana 6 to visualize and analyze Suricata threat intelligence data | 24 |
| Automates importing threat intelligence data into Suricata's surveillance system | 37 |
| A shell-based training environment for Suricata intrusion detection and analysis | 6 |
| Automates incident response collection and processing on Linux hosts. | 274 |
| A fast and extensible system for processing JSON events from security monitoring tools | 51 |
| Customizable dashboards and visualizations for security monitoring and analysis using Suricata IDPS and the ELK stack. | 33 |
| A utility that collects and reports system metrics to an MQTT broker. | 159 |
| Automates scanning of HTTP resources in a target network using XML External Entity (XXE) attacks | 37 |
| Provides a Suricata output to Kafka using the Eve plugin | 14 |
| Detects malicious network and host activity using Yara, Snort, and ClamAV signatures. | 213 |
| A Docker image for running Suricata, a network security system | 269 |
| An analysis tool for packet capture files using Suricata and Zeek | 145 |
| An implementation of the Language Server Protocol for Suricata signatures, adding syntax check and auto-completion to editors. | 66 |
| A tool for inspecting and manipulating RabbitMQ message flows | 265 |