gchq / event-logging-schemaLinks
Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control systems
☆26Updated last month
Alternatives and similar repositories for event-logging-schema
Users that are interested in event-logging-schema are comparing it to the libraries listed below
Sorting:
- Content for Stroom such as XML Schemas, translations, pipelines and dashboards☆10Updated last week
- gaffer-tools is deprecated. Use https://github.com/gchq/gafferpy instead☆50Updated last year
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆17Updated 10 months ago
- This project leverages Ansible to automate DataWave deployments on your cluster☆27Updated 5 years ago
- ☆15Updated 7 years ago
- Python bindings for Yeti's API☆18Updated last year
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- A set of D3 data visualisations for use in Stroom dashboards or other applications☆14Updated 3 weeks ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated 2 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- Generates network traffic summaries.☆22Updated 3 weeks ago
- first commit☆20Updated last year
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 5 months ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 8 months ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Updated 7 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Updated 9 years ago
- Maltego transform for OpenDNS Investigate API☆13Updated 10 years ago