cisagov / network-architecture-verification-and-validationLinks
The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
☆31Updated 11 months ago
Alternatives and similar repositories for network-architecture-verification-and-validation
Users that are interested in network-architecture-verification-and-validation are comparing it to the libraries listed below
Sorting:
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- ☆48Updated 2 weeks ago
- Search a filesystem for indicators of compromise (IoC).☆73Updated last week
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- A collection of tips for using MISP.☆74Updated 5 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆32Updated last year
- ☆11Updated 4 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆52Updated 3 years ago
- Template for building a packet sniffer☆14Updated last year
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- ☆54Updated 3 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- A packet capture visualizer for industrial control networks.☆54Updated last year
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆18Updated last week
- ☆53Updated this week
- Bring Your Own Mitre Att&ck © Matrix !☆13Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- ☆65Updated 3 months ago
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆28Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆43Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- ☆35Updated 4 years ago