diff --git a/README.md b/README.md index 29c364a..4d63361 100644 --- a/README.md +++ b/README.md @@ -1387,6 +1387,10 @@ _return-to-libc techniques_ ptresearch/AttackDetection The Attack Detection Team searches for new vulnerabilities and 0-days, reproduces it and creates PoC exploits to understand how these security flaws work and how related attacks can be detected on the network layer. Additionally, we are interested in malware and hackers’ TTPs, so we develop Suricata rules for detecting all sorts of such activities. + + ROCK NSM + Response Operation Collection Kit - An open source Network Security Monitoring platform. + salesforce/bro-sysmon Bro-Sysmon enables Bro to receive Windows Event Logs. This provide a method to associate Network Monitoring and Host Monitoring. The work was spurred by the need to associate JA3 and HASSH fingerprints with the application on the host. The example below shows the hostname, Process ID, connection information, JA3 fingerprints, Application Path, and binary hashes.