Analytics for Accounting logs from Network devices
☆18Mar 27, 2021Updated 4 years ago
Alternatives and similar repositories for network-device-logs
Users that are interested in network-device-logs are comparing it to the libraries listed below
Sorting:
- ☆12Mar 24, 2018Updated 7 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Exports MISP events to STIX and ingest into McAfee ESM☆15Feb 12, 2020Updated 6 years ago
- Adversary Emulation Planner☆42Jan 9, 2026Updated 2 months ago
- A utility for sharing snippets easily☆11Dec 8, 2022Updated 3 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆18Apr 6, 2019Updated 6 years ago
- Splunk app for Threat hunting☆15Nov 15, 2018Updated 7 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Dec 2, 2021Updated 4 years ago
- PyTest Salt Plugin☆13Jan 27, 2020Updated 6 years ago
- Heos Binding for OpenHab☆13Feb 1, 2019Updated 7 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- ✨ Brand Indicators for Message Identification or BIMI ( 📢 pronounced: Bih-mee) is an emerging email 📧 specification that enables the us…☆10Mar 6, 2024Updated 2 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 3 months ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Jun 4, 2018Updated 7 years ago
- Aggregated ATT&CK technique reporting data. Presented at Splunk GovSummit December 2022☆17Jul 18, 2025Updated 8 months ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Dynamic authoritative name server☆15Apr 21, 2022Updated 3 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Jun 12, 2019Updated 6 years ago
- Maltese - Malware Traffic Emulator☆26Feb 15, 2017Updated 9 years ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 2 years ago
- A Splunk app to use MISP in background☆112Jan 8, 2026Updated 2 months ago
- MITRE Shield website☆19Oct 20, 2021Updated 4 years ago
- Enables Zeek to communicate with Tenzir☆11Jul 20, 2023Updated 2 years ago
- TelerikUI Vulnerability Scanner (CVE-2019-18935)☆12May 10, 2023Updated 2 years ago
- Code for projecting volumetric nifti files to HCP surface and Glasser atlas parcel-wise value extraction☆13May 21, 2023Updated 2 years ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- Bro Detection Scripts☆10Mar 9, 2021Updated 5 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Sep 11, 2020Updated 5 years ago
- ☆18Dec 17, 2024Updated last year
- Collect and query ADS-B data to find aircraft and trends based on geographic region(s), altitude, bearing, aircraft type and more.☆39Mar 5, 2026Updated 2 weeks ago