gchq / gaffer-tools
gaffer-tools is deprecated. Use https://github.com/gchq/gafferpy instead
☆50Updated last year
Related projects ⓘ
Alternatives and complementary repositories for gaffer-tools
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 5 months ago
- A Tool for Complex and Scalable Data Access Policy Enforcement☆96Updated 3 years ago
- Content for Stroom such as XML Schemas, translations, pipelines and dashboards☆9Updated 2 weeks ago
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆15Updated 3 months ago
- A set of D3 data visualisations for use in Stroom dashboards or other applications☆13Updated 4 months ago
- CARET - A tool for viewing cyber analytic relationships☆53Updated 4 years ago
- WALKOFF-enabled applications. #nsacyber☆142Updated 5 years ago
- IRIS Worm is a real-time data graphing component.☆12Updated 4 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆163Updated 4 years ago
- This project leverages Ansible to automate DataWave deployments on your cluster☆26Updated 4 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆55Updated 2 years ago
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆24Updated 5 years ago
- Documentation for Stroom and associated projects☆30Updated last week
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆110Updated 8 years ago
- SkillTree skills-client-examples☆28Updated this week
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆74Updated 8 years ago
- Maltego integration of https://haveibeenpwned.com☆58Updated 9 months ago
- Specifications used in the MISP project including MISP core format☆46Updated last month
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆98Updated 8 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Tools to assist in forensicating docker☆80Updated last month
- Build Python 3 applications that integrate with Apache Accumulo☆29Updated last year
- ☆12Updated this week
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆72Updated 7 years ago
- SkillTree☆25Updated 2 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆83Updated 5 years ago
- Stroom is a highly scalable data storage, processing and analysis platform.☆436Updated this week
- Detect credit card exposures with Bro☆15Updated last year