gchq / event-loggingLinks
A Java JAXB library for generating events conforming to the Event Logging XML Schema
☆16Updated last year
Alternatives and similar repositories for event-logging
Users that are interested in event-logging are comparing it to the libraries listed below
Sorting:
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 8 months ago
- gaffer-tools is deprecated. Use https://github.com/gchq/gafferpy instead☆49Updated 2 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆79Updated 9 years ago
- Repository for various tools around security☆41Updated last year
- A WebSocket library for use with Apache Accumulo☆63Updated 6 months ago
- A set of D3 data visualisations for use in Stroom dashboards or other applications☆14Updated 2 months ago
- Code and templates required to build the DARPA open catalog.☆17Updated 9 years ago
- Data-driven automation platform☆311Updated 2 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Updated 10 years ago
- Distributed P2P Data-driven Workflow Framework☆270Updated this week
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- This project leverages Ansible to automate DataWave deployments on your cluster☆26Updated 6 years ago
- WaterSlide is a streaming event-at-a-time architecture for processing metadata. It is designed to take in a set of streaming events from …☆118Updated 4 years ago
- Minion Frontend☆30Updated 6 years ago
- Sequence Indexing and Search☆110Updated 6 months ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- Osmocom SS7 stack, with Shadytel modifications.☆19Updated 13 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- Login Area Finder: scans host/s for login panels☆14Updated 11 years ago
- Simple Software Vulnerability Language (SSVL)☆13Updated 10 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 9 years ago
- NSA documents in machine readable form☆96Updated 7 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Updated 9 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- IRIS Worm is a real-time data graphing component.☆12Updated 5 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago