cisagov / network-architecture-verification-and-validationLinks
The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
☆35Updated last year
Alternatives and similar repositories for network-architecture-verification-and-validation
Users that are interested in network-architecture-verification-and-validation are comparing it to the libraries listed below
Sorting:
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated last month
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆55Updated 4 years ago
- Corelight@Home script☆46Updated 2 years ago
- ☆73Updated 8 months ago
- A collection of tips for using MISP.☆75Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- ☆79Updated 3 weeks ago
- Passive OS detection based on SYN packets without Transmitting any Data☆49Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Docker image for Velocidex Velociraptor☆141Updated 9 months ago
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆37Updated 3 months ago
- ☆55Updated 3 years ago
- DShield Sensor Log Collection with ELK☆46Updated this week
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆24Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 7 months ago
- ☆100Updated last month
- Industrial Control Systems Network Protocol Parsers☆184Updated 3 months ago
- Collection of useful Canary tools☆91Updated 3 weeks ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆127Updated 8 months ago
- ☆37Updated 4 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated this week
- ☆55Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 9 months ago
- Run zeek with zeekctl in docker☆57Updated last year
- ☆42Updated 2 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆31Updated last year