experimental-suricata-training
Training Environment
A shell-based training environment for Suricata intrusion detection and analysis
6 stars
3 watching
0 forks
Language: Shell
last commit: 9 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
jasonish/docker-suricata | A Docker image for running Suricata, a network security system | 263 |
jasonish/evebox | A web-based event viewer for Suricata EVE events in Elastic Search. | 431 |
jasonish/py-idstools | A collection of Python libraries for working with intrusion detection systems. | 276 |
jasonish/suricatax-rule-parser-rs | A Rust library to parse Suricata security rules and convert them into a higher-level data format | 9 |
pevma/massdeploysuricata | Automates the deployment and updating of Suricata network intrusion detection system software. | 9 |
ismtv/bash_cata | Automates processing of network alerts from Suricata and adds IP addresses to MikroTik address lists. | 9 |
davevs/dvxte | A containerized training environment with multiple vulnerable applications and tools to test security skills | 102 |
jasonish/suricata-redis-output | A plugin for Suricata 7.0.0-dev that writes network traffic to Redis | 7 |
stamusnetworks/scirius | A web application for managing Suricata rulesets and threat hunting | 635 |
travisbgreen/hunting-rules | Provides Suricata IDS alert rules for detecting network anomalies | 153 |
stamusnetworks/suricata-4-analysts | A comprehensive guide to Suricata features and best practices for security analysts and threat hunters. | 52 |
jaromiru/nasimemu | A framework for training reinforcement learning agents to generalize in novel penetration-testing scenarios | 33 |
al0ne/suricata-rules | A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors. | 1,133 |
ccdcoe/cdmcs | An open-source project providing educational materials and resources for learning advanced security monitoring technologies | 100 |
stamusnetworks/kts | Customizable dashboards and visualizations for security monitoring and analysis using Suricata IDPS and the ELK stack. | 33 |