cisagov / network-architecture-verification-and-validationLinks
The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
☆32Updated last year
Alternatives and similar repositories for network-architecture-verification-and-validation
Users that are interested in network-architecture-verification-and-validation are comparing it to the libraries listed below
Sorting:
- ☆54Updated this week
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- ☆64Updated 4 months ago
- Tool used to perform threat intelligence against packet data☆35Updated 4 months ago
- A packet capture visualizer for industrial control networks.☆55Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- Run Velociraptor on Security Onion☆38Updated 2 years ago
- ☆51Updated 3 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 3 years ago
- ☆11Updated 4 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- ☆71Updated 2 months ago
- ☆54Updated 4 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆34Updated last year
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- A collection of tips for using MISP.☆74Updated 6 months ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆74Updated last week
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆66Updated 3 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆83Updated last week
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- MITRE Shield website☆19Updated 3 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 2 months ago
- CyHy Dashboard☆17Updated this week
- Zeek support for Community ID flow hashing.☆35Updated last year