ログ分析トレーニング用コンテンツ
☆97Jul 27, 2020Updated 5 years ago
Alternatives and similar repositories for log-analysis-training
Users that are interested in log-analysis-training are comparing it to the libraries listed below
Sorting:
- 分析ツール結果シート☆19Nov 13, 2017Updated 8 years ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆17Dec 11, 2025Updated 2 months ago
- DDIR: An Open Source Dataset for Darkweb Research☆15Oct 28, 2019Updated 6 years ago
- Fuzzy Hash calculated from import API of PE files☆90Aug 26, 2022Updated 3 years ago
- CWE-1003 日本語訳☆10Feb 16, 2023Updated 3 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆42Sep 21, 2023Updated 2 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- ペネトレーションテストについて☆74Aug 12, 2021Updated 4 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- ☆253Jan 11, 2023Updated 3 years ago
- CDIR (Cyber Defense Institute Incident Response) Collector - live collection tool based on oss tool/library☆165Oct 25, 2024Updated last year
- Remove messages and files in a certain duration for your Slack team☆14Mar 2, 2021Updated 5 years ago
- Seccamp2021で開発しているBGPのなにか☆11Oct 3, 2021Updated 4 years ago
- 簡単に構築可能で、シンプルな機能で動作を把握しやすくした、サーバ側低対話型の入門用 Web ハニーポット。☆81Jun 21, 2020Updated 5 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- ☆34Apr 25, 2021Updated 4 years ago
- 新技術に関する診断手法ドキュメントのリポジトリ☆15Jul 22, 2025Updated 7 months ago
- ☆14Aug 24, 2020Updated 5 years ago
- LNK to JSON☆14Mar 7, 2019Updated 6 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Dec 22, 2023Updated 2 years ago
- ChaetSheet for Pwn Reversing of CTF☆32Aug 28, 2020Updated 5 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- ☆74Nov 15, 2024Updated last year
- Ochakai Hardening is a tool that allows users to easily experience incident response training.☆19Oct 8, 2024Updated last year
- ☆21Nov 19, 2025Updated 3 months ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- A utility to parse and analyze Windows Event Log files for recurrent failure patterns☆19Jun 5, 2025Updated 8 months ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Oct 13, 2022Updated 3 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Dec 17, 2025Updated 2 months ago
- Tool to test for existence of CVE-2020-8218☆22Sep 5, 2020Updated 5 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Recover EXT filesystem info from carved directory blocks☆19Jun 23, 2017Updated 8 years ago
- Seamless Threat Intelligence Platform☆47Jan 29, 2024Updated 2 years ago