dataShark is a Security & Network Event Analytics Framework built on Apache Spark
☆44Feb 14, 2017Updated 9 years ago
Alternatives and similar repositories for dataShark
Users that are interested in dataShark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 9 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- ☆17Jan 18, 2023Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- ☆42Sep 16, 2022Updated 3 years ago
- The instructions provide a simpler way to install and run openvas docker container. The script automates the process of scanning a host p…☆16Feb 4, 2019Updated 7 years ago
- DHCP attack tool☆21Oct 4, 2024Updated last year
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- Tools to parse, diff, and normalize OpenWRT UCI configuration files☆20Nov 1, 2025Updated 4 months ago
- Security Alert Decoration☆27Jul 21, 2025Updated 8 months ago
- Geppetto - Virtual machine and infrastructure orchestration☆14Feb 13, 2025Updated last year
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- General scripts for random stuff☆38Oct 29, 2021Updated 4 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- A shell script to download malware domains from various sources, and configuring unbound DNS config file to be used as a local recursive …☆19Sep 12, 2014Updated 11 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- go patterns☆33Dec 3, 2020Updated 5 years ago
- ☆11Jul 13, 2021Updated 4 years ago
- Arduino Mega based datalogger for use in video on screen display☆10Oct 28, 2015Updated 10 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- ☆10Jan 21, 2022Updated 4 years ago
- Utility to save FileVault recovery keys as BitLocker passwords in Active Directory☆13Mar 13, 2019Updated 7 years ago
- ☆16Updated this week
- DEF CON 26 WorkShop - Fuzzing FTW☆20Aug 9, 2018Updated 7 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- ☆27Feb 6, 2022Updated 4 years ago
- Baidu 100G Chasiss Switch hardware spec☆12Sep 20, 2017Updated 8 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace