certego / BuffaLogsLinks
BuffaLogs is an Open Source Django App whose main purpose is to detect login anomalies
☆55Updated last week
Alternatives and similar repositories for BuffaLogs
Users that are interested in BuffaLogs are comparing it to the libraries listed below
Sorting:
- Threat Intel Platform for T-POTs☆159Updated this week
- ☆32Updated 3 weeks ago
- intentionally vuln web Application Security in django☆291Updated 2 months ago
- AssemblyLine 4: File triage and malware analysis☆403Updated this week
- Core information on Stratosphere's participation on the Google Summer of Code Program☆27Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆286Updated last year
- A comprehensive scanner for Google Cloud☆342Updated last week
- HASH (HTTP Agnostic Software Honeypot)☆140Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆415Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated last year
- DFIQ is a collection of investigative questions and the approaches for answering them☆298Updated 10 months ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆336Updated last week
- This is a collection of threat detection rules / rules engines that I have come across.☆298Updated last year
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆506Updated this week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆81Updated last year
- Python library to carry out DFIR analysis on the Cloud☆489Updated 2 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆238Updated last week
- Zeek-Formatted Threat Intelligence Feeds☆381Updated this week
- ☆190Updated 2 weeks ago
- Lacus is a capturing system using playwright, as a web service.☆95Updated this week
- Casting light on shadow cloud deployments. Detect exposure of resources deployed in AWS.☆25Updated last month
- List of past and future infosec related events.☆165Updated this week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆213Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Updated last year
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆404Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆168Updated 2 years ago
- Cisco Orbital - Osquery queries by Talos☆135Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆335Updated 7 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆268Updated this week