EmreOvunc / Log-AnalysisLinks
SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.
☆19Updated 5 years ago
Alternatives and similar repositories for Log-Analysis
Users that are interested in Log-Analysis are comparing it to the libraries listed below
Sorting:
- Pcap (capture file) Analysis Toolkit(v.1)☆107Updated 8 years ago
- Masscan integrated with Shodan API☆42Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- A SIEM inspired by HECTOR, built on Django.☆29Updated 6 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Updated 3 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 8 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- A simple Nessus results viewer☆49Updated 12 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 7 years ago
- ☆66Updated 7 years ago
- Combining OSINT sources in Elastic Stack☆80Updated 4 years ago
- wifiDOS with scapy☆16Updated 9 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 8 years ago
- OSCP Scripts☆14Updated 9 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆17Updated 6 years ago
- Express security essentials deployment for Linux Servers☆60Updated 4 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- intrusion detection☆24Updated 8 years ago
- Passive DNS V2☆60Updated 11 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- This is my path to OSCP☆11Updated 7 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago