gchq / stroom-docs
Documentation for Stroom and associated projects
☆30Updated 2 weeks ago
Related projects: ⓘ
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 9 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆163Updated 4 years ago
- IP geolocation for authentication events with MozDef☆10Updated 5 years ago
- SPL to lucene translator☆15Updated 9 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 3 months ago
- ☆16Updated this week
- Fun with Amazon AWS and Maltego☆28Updated 7 years ago
- WALKOFF-enabled applications. #nsacyber☆141Updated 5 years ago
- STIX Tools & Scripts☆47Updated 10 years ago
- Dockerfiles for NSM tools☆84Updated 7 years ago
- ☆38Updated this week
- ☆10Updated this week
- A collection of Ansible roles for automating infosec builds.☆92Updated 6 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆43Updated 3 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆16Updated 6 years ago
- ☆27Updated this week
- Bringing DevOps to Forensics☆34Updated 9 years ago
- ☆28Updated 7 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆76Updated 7 months ago
- gaffer-tools is deprecated. Use https://github.com/gchq/gafferpy instead☆49Updated 11 months ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated last year
- Feed for verious malicious IPs such as malware and botnets☆12Updated 8 years ago
- Export Maltego Graphs to JSON format☆19Updated 6 years ago
- Analysis Correlation Engine☆25Updated 5 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 9 years ago
- ☆42Updated this week
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆97Updated 8 years ago
- ☆23Updated this week
- Meeting notes☆15Updated 8 years ago