cisagov / network-architecture-verification-and-validation
The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
☆31Updated 11 months ago
Alternatives and similar repositories for network-architecture-verification-and-validation
Users that are interested in network-architecture-verification-and-validation are comparing it to the libraries listed below
Sorting:
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆31Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Run zeek with zeekctl in docker☆51Updated 8 months ago
- ☆65Updated 2 months ago
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆52Updated 3 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- A packet capture visualizer for industrial control networks.☆53Updated last year
- ☆53Updated this week
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- ☆35Updated 4 years ago
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- Corelight@Home script☆41Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- A collection of tips for using MISP.☆74Updated 5 months ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 9 months ago
- ☆19Updated 3 years ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆15Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Log4j Exploit Detection Logic for Zeek☆19Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Zeek support for Community ID flow hashing.☆35Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆42Updated 2 years ago
- ☆69Updated last month
- Workflows for Shuffle☆22Updated 2 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 months ago