cisagov / network-architecture-verification-and-validationLinks
The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
☆35Updated last year
Alternatives and similar repositories for network-architecture-verification-and-validation
Users that are interested in network-architecture-verification-and-validation are comparing it to the libraries listed below
Sorting:
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated 2 months ago
- ☆73Updated 8 months ago
- A collection of tips for using MISP.☆75Updated last year
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆71Updated 4 years ago
- Docker image for Velocidex Velociraptor☆142Updated 9 months ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆55Updated 4 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆49Updated 6 months ago
- ☆56Updated 3 years ago
- Run zeek with zeekctl in docker☆61Updated last year
- Corelight@Home script☆46Updated 2 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆88Updated last week
- Industrial Control Systems Network Protocol Parsers☆185Updated 3 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- ☆79Updated last month
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated last week
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Docker image for MISP☆135Updated last week
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- DShield Sensor Log Collection with ELK☆46Updated this week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 8 months ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated last week
- Fast IOC and YARA Scanner☆87Updated 5 years ago
- My Jupyter Notebooks☆36Updated 9 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- ☆40Updated 2 years ago