Apache Logfile Security Analyzer
☆214Feb 22, 2019Updated 7 years ago
Alternatives and similar repositories for lorg
Users that are interested in lorg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- Scalp! is a log analyzer for the Apache web server that aims to look for security problems☆57May 1, 2021Updated 5 years ago
- Apache Real Time Logs Analyzer System☆125May 22, 2023Updated 2 years ago
- A Python library and command line tools to provide interactive log visualization.☆145Dec 27, 2022Updated 3 years ago
- ☆14May 30, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆211Mar 12, 2025Updated last year
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆296Sep 30, 2023Updated 2 years ago
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago
- ☆26Apr 5, 2020Updated 6 years ago
- ☆21May 8, 2022Updated 3 years ago
- ☆520Jan 26, 2021Updated 5 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- ☆11Apr 28, 2017Updated 9 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 7 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- psad: Intrusion Detection and Log Analysis with iptables☆422Jun 11, 2023Updated 2 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆269Jun 15, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Oct 22, 2016Updated 9 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- Automated Tactics Techniques & Procedures☆261May 26, 2023Updated 2 years ago
- ☆312Aug 14, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 4 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,431Nov 16, 2023Updated 2 years ago
- Cobra-W -> Cobra-RE 将进一步提升漏洞发现的准确性并降低漏报率(弃坑了)☆16Aug 15, 2020Updated 5 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Simple, useful scripts for red/blue team situations☆22May 4, 2015Updated 10 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago