EmreOvunc / Log-AnalysisLinks
SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.
☆19Updated 5 years ago
Alternatives and similar repositories for Log-Analysis
Users that are interested in Log-Analysis are comparing it to the libraries listed below
Sorting:
- Pcap (capture file) Analysis Toolkit(v.1)☆108Updated 8 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- wifiDOS with scapy☆16Updated 9 years ago
- A SIEM inspired by HECTOR, built on Django.☆29Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Masscan integrated with Shodan API☆42Updated 8 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Updated 4 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 8 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Updated 2 years ago
- Combining OSINT sources in Elastic Stack☆80Updated 5 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 7 years ago
- Distributed Network Vulnerability Scanner☆123Updated 6 years ago
- ☆66Updated 7 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97Updated 7 years ago
- Tools that are related to pentest and network security☆96Updated 4 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- GUI Tool to generate threat intelligence information in various formats☆44Updated 7 years ago
- Express security essentials deployment for Linux Servers☆60Updated 5 years ago
- A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, crede…☆21Updated 7 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆159Updated 5 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆76Updated 5 years ago