hatRiot / logalyzer
Auth.log parser
☆46Updated 6 years ago
Alternatives and similar repositories for logalyzer:
Users that are interested in logalyzer are comparing it to the libraries listed below
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 2 months ago
- Find abuse contacts for observables☆69Updated 2 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆66Updated 2 years ago
- Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses☆98Updated 5 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆20Updated 2 years ago
- automate your MISP installs☆66Updated 4 years ago
- Smoking Linux Every Day!☆54Updated 4 years ago
- ☆52Updated 5 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆106Updated 6 years ago
- Salt States for Configuring the SIFT Workstation☆100Updated this week
- A list of OPML Security Feeds☆69Updated last year
- Ansible playbook to install cuckoo sandbox.☆11Updated 5 years ago
- ☆24Updated 5 years ago
- Nix Audit made easier (RHEL, CentOS)☆64Updated 3 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- ☆15Updated 4 years ago
- IMAP or SMTP honeypot written in Golang☆25Updated 2 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- ☆132Updated 2 months ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- setup zeek, previously Bro IDS☆18Updated 3 months ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆15Updated 3 years ago
- shell script to create an image and perform initial examination on a drive☆15Updated 5 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆17Updated 9 years ago
- Intrusion Prevention System (IPS) for Secure Shell (SSH)☆47Updated 11 years ago