gchq / gaffer-tools
gaffer-tools is deprecated. Use https://github.com/gchq/gafferpy instead
☆50Updated last year
Alternatives and similar repositories for gaffer-tools:
Users that are interested in gaffer-tools are comparing it to the libraries listed below
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆26Updated this week
- Content for Stroom such as XML Schemas, translations, pipelines and dashboards☆10Updated 3 months ago
- A Tool for Complex and Scalable Data Access Policy Enforcement☆97Updated 3 years ago
- A set of D3 data visualisations for use in Stroom dashboards or other applications☆14Updated 9 months ago
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆17Updated 8 months ago
- This project leverages Ansible to automate DataWave deployments on your cluster☆27Updated 5 years ago
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆25Updated 6 years ago
- Build Python 3 applications that integrate with Apache Accumulo☆32Updated last year
- CARET - A tool for viewing cyber analytic relationships☆54Updated 5 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆163Updated 4 years ago
- SkillTree☆26Updated 3 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 8 years ago
- ☆16Updated last month
- Apache Accumulo Website☆14Updated this week
- WALKOFF-enabled applications. #nsacyber☆144Updated 6 years ago
- Documentation for Zeek☆50Updated this week
- Build Automated Machine Images for MISP☆28Updated last year
- Guidance for blocking outdated web technologies. #nsacyber☆57Updated 3 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆112Updated 8 years ago
- SkillTree skills-client-examples☆32Updated last week
- Best practices in threat intelligence☆46Updated 2 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆75Updated 7 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated last year
- Maltego integration of https://haveibeenpwned.com☆60Updated last month
- Provides bulk nominatim geocoding for QGIS☆38Updated last year
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- Python bindings for Yeti's API☆18Updated last year
- For storing of the volumes☆4Updated 5 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Updated 8 years ago