cisagov / network-architecture-verification-and-validationLinks
The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
☆32Updated last year
Alternatives and similar repositories for network-architecture-verification-and-validation
Users that are interested in network-architecture-verification-and-validation are comparing it to the libraries listed below
Sorting:
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 11 months ago
- ☆48Updated this week
- ☆55Updated this week
- Run Velociraptor on Security Onion☆38Updated 2 years ago
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- a port made of honey for blocking people☆13Updated 5 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆10Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆47Updated last month
- Corelight@Home script☆42Updated last year
- CrowdStrike's Open Source Policy & Contribution Guide☆42Updated 3 months ago
- ☆51Updated 3 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 2 weeks ago
- Search a filesystem for indicators of compromise (IoC).☆74Updated last month
- A collection of tips for using MISP.☆74Updated 7 months ago
- Tool used to perform threat intelligence against packet data☆35Updated 5 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- ☆16Updated 3 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- ☆11Updated 4 years ago
- Web based S1 query navigator for one-click threat hunting☆21Updated 4 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated this week
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆41Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 6 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 3 years ago