EmreOvunc / Log-AnalysisLinks
SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.
☆19Updated 5 years ago
Alternatives and similar repositories for Log-Analysis
Users that are interested in Log-Analysis are comparing it to the libraries listed below
Sorting:
- Express security essentials deployment for Linux Servers☆60Updated 5 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆108Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Masscan integrated with Shodan API☆43Updated 8 years ago
- wifiDOS with scapy☆16Updated 9 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- A SIEM inspired by HECTOR, built on Django.☆29Updated 6 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- Combining OSINT sources in Elastic Stack☆80Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Updated 4 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- ☆66Updated 7 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 8 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- CTF Writeups☆17Updated 8 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- Tools that are related to pentest and network security☆97Updated 4 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- A short and small memory forensics helper.☆53Updated 8 years ago
- Customisable PCAP parser and research assistant☆26Updated 7 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 8 years ago
- 📡🔍Searches for wifi-pineapple traces and calculate wireless network security score 🍍☆159Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆44Updated 7 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Updated 6 years ago
- Various tools to track the Mirai botnet☆20Updated 9 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆17Updated 6 years ago