certego / BuffaLogs
BuffaLogs is an Open Source Django App whose main purpose is to detect login anomalies
☆40Updated this week
Alternatives and similar repositories for BuffaLogs:
Users that are interested in BuffaLogs are comparing it to the libraries listed below
- Threat Intel Platform for T-POTs☆144Updated 2 weeks ago
- ☆30Updated last week
- HASH (HTTP Agnostic Software Honeypot)☆137Updated 11 months ago
- DFIQ is a collection of investigative questions and the approaches for answering them☆274Updated 2 months ago
- ☆16Updated 2 months ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated 4 months ago
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆66Updated last week
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆161Updated 3 weeks ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆110Updated 4 months ago
- ☆27Updated 4 years ago
- This is a repository for freq.py and freq_server.py☆207Updated 4 years ago
- A production ready Dockered MISP☆23Updated last year
- Practical Threat Detection Engineering, Published by Packt☆67Updated last year
- pocket guide for core detection engineering concepts☆28Updated last year
- ☆87Updated last month
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆274Updated last year
- Malware repository component for samples & static configuration with REST API interface.☆341Updated last week
- AssemblyLine 4: File triage and malware analysis☆298Updated this week
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆164Updated last year
- IntelOwl's client library/SDK in golang.☆21Updated last week
- ☆47Updated last month
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆49Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Documentation used for Shuffle☆19Updated last week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- Example scripts and rules for use in Resilient playbooks.☆34Updated last year
- Audit log wall of shame.☆41Updated 5 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆176Updated 6 months ago
- Anvilogic Forge☆95Updated this week