gchq / event-logging-schemaLinks
Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control systems
☆25Updated 8 months ago
Alternatives and similar repositories for event-logging-schema
Users that are interested in event-logging-schema are comparing it to the libraries listed below
Sorting:
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 7 months ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 6 years ago
- Specifications used in the MISP project including MISP core format☆53Updated last week
- Traceroute improved wrapper for CSIRT and CERT operators☆40Updated last year
- pcapdj - dispatch pcap files☆46Updated 5 years ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 3 years ago
- Tools for Network Archaeology (internet protocol analysis)☆29Updated 4 months ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 2 weeks ago
- Hosted analyzers built for Grapl☆14Updated 3 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 5 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 months ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- You're busted!☆27Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Network visualizer tool built using Processing☆24Updated 4 years ago
- Tools to assist in forensicating docker☆85Updated 10 months ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Updated 7 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 7 years ago
- Docker configs and build scripts.☆23Updated 11 years ago
- Best practices in threat intelligence☆50Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- Using osquery for Mass Incident Detection & Response☆19Updated 9 years ago