experimental-suricata-training

Training Environment

A shell-based training environment for Suricata intrusion detection and analysis

GitHub

6 stars
3 watching
0 forks
Language: Shell
last commit: 9 months ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
jasonish/docker-suricata A Docker image for running Suricata, a network security system 263
jasonish/evebox A web-based event viewer for Suricata EVE events in Elastic Search. 431
jasonish/py-idstools A collection of Python libraries for working with intrusion detection systems. 276
jasonish/suricatax-rule-parser-rs A Rust library to parse Suricata security rules and convert them into a higher-level data format 9
pevma/massdeploysuricata Automates the deployment and updating of Suricata network intrusion detection system software. 9
ismtv/bash_cata Automates processing of network alerts from Suricata and adds IP addresses to MikroTik address lists. 9
davevs/dvxte A containerized training environment with multiple vulnerable applications and tools to test security skills 102
jasonish/suricata-redis-output A plugin for Suricata 7.0.0-dev that writes network traffic to Redis 7
stamusnetworks/scirius A web application for managing Suricata rulesets and threat hunting 635
travisbgreen/hunting-rules Provides Suricata IDS alert rules for detecting network anomalies 153
stamusnetworks/suricata-4-analysts A comprehensive guide to Suricata features and best practices for security analysts and threat hunters. 52
jaromiru/nasimemu A framework for training reinforcement learning agents to generalize in novel penetration-testing scenarios 33
al0ne/suricata-rules A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors. 1,133
ccdcoe/cdmcs An open-source project providing educational materials and resources for learning advanced security monitoring technologies 100
stamusnetworks/kts Customizable dashboards and visualizations for security monitoring and analysis using Suricata IDPS and the ELK stack. 33