cisagov / network-architecture-verification-and-validation
The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
☆31Updated 10 months ago
Alternatives and similar repositories for network-architecture-verification-and-validation:
Users that are interested in network-architecture-verification-and-validation are comparing it to the libraries listed below
- A packet capture visualizer for industrial control networks.☆53Updated last year
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆52Updated 3 years ago
- ☆34Updated 4 years ago
- ☆69Updated 3 weeks ago
- Learn about a network from a pcap file or reading from an interface☆28Updated last year
- A collection of tips for using MISP.☆74Updated 4 months ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆31Updated last year
- ☆53Updated this week
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 5 months ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆81Updated last week
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Run zeek with zeekctl in docker☆51Updated 7 months ago
- ☆54Updated 3 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- ☆65Updated 2 months ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Updated last year
- ☆48Updated 2 weeks ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated 11 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆45Updated last week
- Import CrowdStrike Threat Intelligence into your instance of MISP☆46Updated last month
- The FASTEST way to consume threat intel.☆68Updated last year
- Industrial Control Systems Network Protocol Parsers☆168Updated 3 months ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago
- Log4j Exploit Detection Logic for Zeek☆19Updated 11 months ago
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆29Updated 7 months ago
- ☆51Updated 3 years ago
- Template for building a packet sniffer☆14Updated last year