Skip to content
OpenCatalogcurated by FLOSSK
Security & Privacy

Zeek

Network security monitor producing rich logs (conn, DNS, HTTP, SSL, files) for analytics—not a classic IDS signature engine.

Why it is included

Foundation of many NSM pipelines feeding SIEMs and threat hunting.

Best for

Instrumenting east-west and north-south traffic for hunters and IR.

Strengths

  • Zeek scripting
  • Extensive logs
  • Community packages

Limitations

  • Storage and parser maintenance at scale

Good alternatives

Suricata (different emphasis) · Commercial NDR

Related tools