cisagov / network-architecture-verification-and-validationLinks
The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
☆34Updated last year
Alternatives and similar repositories for network-architecture-verification-and-validation
Users that are interested in network-architecture-verification-and-validation are comparing it to the libraries listed below
Sorting:
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago
- ☆72Updated 4 months ago
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- Run zeek with zeekctl in docker☆55Updated 11 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 2 years ago
- Docker image for Velocidex Velociraptor☆132Updated 5 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆46Updated last year
- ☆67Updated last month
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 3 years ago
- Run Velociraptor on Security Onion☆39Updated 3 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆68Updated 4 years ago
- Corelight@Home script☆43Updated last year
- A collection of tips for using MISP.☆74Updated 8 months ago
- ☆53Updated 3 years ago
- Industrial Control Systems Network Protocol Parsers☆176Updated last month
- Collection of useful Canary tools☆88Updated 3 weeks ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 5 months ago
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆36Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 2 months ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆84Updated this week
- Fast IOC and YARA Scanner☆83Updated 5 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 11 months ago
- Tools for simulating threats☆192Updated last year
- Extracts fields from zeek logs, compatible with zeek-cut☆23Updated last year
- ☆72Updated 2 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Search a filesystem for indicators of compromise (IoC).☆80Updated last month
- ☆42Updated 2 years ago