Apache Logfile Security Analyzer
☆214Feb 22, 2019Updated 7 years ago
Alternatives and similar repositories for lorg
Users that are interested in lorg are comparing it to the libraries listed below
Sorting:
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- Apache Real Time Logs Analyzer System☆125May 22, 2023Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ☆14May 30, 2018Updated 7 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆294Sep 30, 2023Updated 2 years ago
- A Python library and command line tools to provide interactive log visualization.☆144Dec 27, 2022Updated 3 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆208Mar 12, 2025Updated 11 months ago
- ☆26Apr 5, 2020Updated 5 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 6 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Oct 22, 2016Updated 9 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆554May 9, 2023Updated 2 years ago
- Script for automating Linux memory capture and analysis☆274Feb 1, 2020Updated 6 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- Maltego transforms for the ThreatCrowd search API☆47Apr 11, 2018Updated 7 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- Automated Tactics Techniques & Procedures☆259May 26, 2023Updated 2 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- psad: Intrusion Detection and Log Analysis with iptables☆416Jun 11, 2023Updated 2 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Backdoor detection for VMware view☆13Jan 5, 2022Updated 4 years ago
- A dsniff project using bro☆11Jan 25, 2016Updated 10 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,362Feb 23, 2026Updated last week
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆261Oct 18, 2017Updated 8 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,428Nov 16, 2023Updated 2 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Nov 30, 2016Updated 9 years ago