gchq / event-logging
A Java JAXB library for generating events conforming to the Event Logging XML Schema
☆15Updated 5 months ago
Alternatives and similar repositories for event-logging:
Users that are interested in event-logging are comparing it to the libraries listed below
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 6 months ago
- Content for Stroom such as XML Schemas, translations, pipelines and dashboards☆9Updated 2 months ago
- gaffer-tools is deprecated. Use https://github.com/gchq/gafferpy instead☆50Updated last year
- A set of D3 data visualisations for use in Stroom dashboards or other applications☆13Updated 6 months ago
- ☆14Updated this week
- A flexible library for writing functional operations in Java☆21Updated this week
- This project leverages Ansible to automate DataWave deployments on your cluster☆27Updated 5 years ago
- A WebSocket library for use with Apache Accumulo☆60Updated 3 months ago
- Detect credit card exposures with Bro☆15Updated last year
- Minion Frontend☆30Updated 5 years ago
- Repository for various tools around security☆42Updated 6 months ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆28Updated 9 years ago
- ☆37Updated 9 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆17Updated 11 years ago
- Login Area Finder: scans host/s for login panels☆14Updated 10 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 9 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆74Updated 8 years ago
- SkillTree skills-client-examples☆28Updated this week
- Investigation data from two reports around the Blue Coat networking kit.☆18Updated 10 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- docker image analyzer☆13Updated this week
- A program to monitor network traffic and detect unauthorized sessions.☆41Updated 14 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆19Updated 8 months ago
- ☆15Updated 6 years ago
- Osmocom SS7 stack, with Shadytel modifications.☆17Updated 12 years ago