cisagov / network-architecture-verification-and-validationLinks
The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
☆35Updated last year
Alternatives and similar repositories for network-architecture-verification-and-validation
Users that are interested in network-architecture-verification-and-validation are comparing it to the libraries listed below
Sorting:
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated last month
- Run zeek with zeekctl in docker☆56Updated last year
- ☆72Updated 7 months ago
- Corelight@Home script☆45Updated 2 years ago
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- ☆55Updated 3 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Industrial Control Systems Network Protocol Parsers☆182Updated 2 months ago
- ☆78Updated 2 weeks ago
- A collection of tips for using MISP.☆74Updated 11 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆98Updated 2 months ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆87Updated last week
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆31Updated last year
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆55Updated 4 years ago
- Docker image for Velocidex Velociraptor☆140Updated 8 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆23Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 5 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆37Updated 2 months ago
- ☆39Updated 2 years ago
- ☆99Updated 2 weeks ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 7 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Updated last week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- Passive OS detection based on SYN packets without Transmitting any Data☆49Updated 2 years ago