mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2024-12-11 09:04:25 -05:00
[Tools][DFIR] Rock NSM
This commit is contained in:
parent
11f65cb016
commit
332c39bf34
@ -1387,6 +1387,10 @@ _return-to-libc techniques_
|
||||
<td><a href="https://github.com/ptresearch/AttackDetection">ptresearch/AttackDetection</a></td>
|
||||
<td>The Attack Detection Team searches for new vulnerabilities and 0-days, reproduces it and creates PoC exploits to understand how these security flaws work and how related attacks can be detected on the network layer. Additionally, we are interested in malware and hackers’ TTPs, so we develop Suricata rules for detecting all sorts of such activities.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://rocknsm.io/">ROCK NSM</a></td>
|
||||
<td>Response Operation Collection Kit - An open source Network Security Monitoring platform.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/salesforce/bro-sysmon/">salesforce/bro-sysmon</td>
|
||||
<td>Bro-Sysmon enables Bro to receive Windows Event Logs. This provide a method to associate Network Monitoring and Host Monitoring. The work was spurred by the need to associate JA3 and HASSH fingerprints with the application on the host. The example below shows the hostname, Process ID, connection information, JA3 fingerprints, Application Path, and binary hashes.</td>
|
||||
|
Loading…
Reference in New Issue
Block a user