SubtleScope / logfile-generatorsLinks
Series of scripts to generate fake logs for use in cyber exercises.
☆17Updated 10 years ago
Alternatives and similar repositories for logfile-generators
Users that are interested in logfile-generators are comparing it to the libraries listed below
Sorting:
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 4 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- NTP logger/honeypot☆55Updated 11 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27Updated 4 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Cli interface to threatcrowd.org☆20Updated 8 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- ☆49Updated 10 years ago
- Harbinger Threat Intelligence☆83Updated 10 years ago
- AYY LMAO☆22Updated 9 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- ☆50Updated 9 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- ☆48Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- ☆64Updated 3 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115Updated 9 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 10 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 10 years ago
- Honeypot repo☆48Updated 10 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year