hatRiot / logalyzerLinks
Auth.log parser
☆47Updated 7 years ago
Alternatives and similar repositories for logalyzer
Users that are interested in logalyzer are comparing it to the libraries listed below
Sorting:
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- ☆52Updated 5 years ago
- ☆47Updated 10 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Updated 9 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21Updated 3 years ago
- Passwords of SSH Intruders Transferred to Text☆157Updated last year
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆100Updated 6 years ago
- Salt States for Configuring the SIFT Workstation☆105Updated 3 weeks ago
- Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses☆102Updated 5 years ago
- ☆139Updated 3 weeks ago
- Find abuse contacts for observables☆70Updated 2 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 4 months ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆106Updated last year
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 8 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- Logstash Configuration for Linux Logs (Authentication, Apache, Mail)☆93Updated 5 years ago
- Collection of Auditd Examples and Presentations☆85Updated 4 years ago
- Maltego entity pack encompassing the entire STIX 1.2 data model and a targeted subset of the CybOX 2.1 data model☆11Updated 9 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- GeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.☆196Updated last year
- Ansible playbook to install cuckoo sandbox.☆11Updated 6 years ago
- Python module to interface with the OpenDNS Investigate API☆63Updated 3 years ago
- ☆141Updated last year
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 6 years ago