gchq / stroom-content
Content for Stroom such as XML Schemas, translations, pipelines and dashboards
☆9Updated 2 months ago
Alternatives and similar repositories for stroom-content:
Users that are interested in stroom-content are comparing it to the libraries listed below
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 9 months ago
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆15Updated 7 months ago
- gaffer-tools is deprecated. Use https://github.com/gchq/gafferpy instead☆50Updated last year
- A set of D3 data visualisations for use in Stroom dashboards or other applications☆13Updated 8 months ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Fun with Amazon AWS and Maltego☆29Updated 7 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- This project leverages Ansible to automate DataWave deployments on your cluster☆27Updated 5 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Machines created to speed up analysis inside of Maltego☆16Updated 9 years ago
- A curated list of tools for incident response☆29Updated last year
- A program to monitor network traffic and detect unauthorized sessions.☆41Updated 14 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Network white noise collector☆18Updated 9 years ago
- ☆10Updated 7 years ago
- Popping boxes with Nmap☆18Updated 12 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Python bindings for Yeti's API☆18Updated last year
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆51Updated 3 years ago
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago