gchq / event-loggingLinks
A Java JAXB library for generating events conforming to the Event Logging XML Schema
☆16Updated last year
Alternatives and similar repositories for event-logging
Users that are interested in event-logging are comparing it to the libraries listed below
Sorting:
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 9 months ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆80Updated 9 years ago
- A set of D3 data visualisations for use in Stroom dashboards or other applications☆14Updated 3 months ago
- gaffer-tools is deprecated. Use https://github.com/gchq/gafferpy instead☆49Updated 2 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- Login Area Finder: scans host/s for login panels☆14Updated 11 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Updated 10 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 11 years ago
- ☆36Updated 11 years ago
- Code and templates required to build the DARPA open catalog.☆17Updated 9 years ago
- Distributed P2P Data-driven Workflow Framework☆273Updated last week
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 7 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Updated 12 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Passive DHCP fingerprinting implementation☆52Updated 9 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- An advanced memory forensics framework☆25Updated 11 years ago
- Fun with Amazon AWS and Maltego☆29Updated 8 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- A WebSocket library for use with Apache Accumulo☆63Updated 6 months ago
- Maltego Transforms to Query Traffic Records☆34Updated 10 years ago
- Repository for various tools around security☆41Updated last year
- DHCP Snooping app - great for finding rogue DHCP servers☆35Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 2 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago