hatRiot / logalyzerLinks
Auth.log parser
☆47Updated 7 years ago
Alternatives and similar repositories for logalyzer
Users that are interested in logalyzer are comparing it to the libraries listed below
Sorting:
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 6 years ago
- ☆47Updated 10 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Bash and Python Honeyport scripts☆45Updated 8 years ago
- Manageable report from lynis text output, in various formats.☆75Updated 3 months ago
- A simple command-line script to interact with the virustotal-api☆61Updated 7 years ago
- Find abuse contacts for observables☆70Updated 2 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21Updated 3 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆68Updated 2 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses☆101Updated 5 years ago
- Salt States for Configuring the SIFT Workstation☆104Updated 2 weeks ago
- ☆17Updated 6 years ago
- Intrusion Prevention System (IPS) for Secure Shell (SSH)☆51Updated 11 years ago
- Smoking Linux Every Day!☆54Updated 5 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- ☆52Updated 5 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- A service to test mail servers for best practices.☆37Updated 7 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆17Updated 9 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- automate your MISP installs☆68Updated 5 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 8 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago