Open Source Cyber Security Platform
☆30Jul 26, 2013Updated 12 years ago
Alternatives and similar repositories for SHERPASURFING
Users that are interested in SHERPASURFING are comparing it to the libraries listed below
Sorting:
- An open source pcap packet and NetFlow file analysis tool using Hadoop MapReduce and Hive.☆44Jul 29, 2013Updated 12 years ago
- Hadoop library to read packet capture (PCAP) files☆212Jun 14, 2023Updated 2 years ago
- Packetpig - Open Source Big Data Security Analytics☆298May 14, 2018Updated 7 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Nov 24, 2014Updated 11 years ago
- Reassembles UDP/TCP packets into application layer messages.☆42Mar 28, 2018Updated 7 years ago
- ☆20Jun 29, 2022Updated 3 years ago
- tiger compiler☆10May 6, 2018Updated 7 years ago
- Data Governance app for Splunk☆12Oct 19, 2023Updated 2 years ago
- Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Official mirror of git.bro.org/br…☆10Aug 16, 2014Updated 11 years ago
- Supporting code for my PyCon 2014 presentation: https://us.pycon.org/2014/schedule/presentation/218/☆24Apr 11, 2014Updated 11 years ago
- Coq & Haskell code for Calculating Correct Compilers II☆12Feb 22, 2022Updated 4 years ago
- Summation of the OWASP Testing Guide for reference☆10Jun 19, 2017Updated 8 years ago
- A Native Extension for Adobe AIR that provides access to the battery life and information on an iOS device☆20Sep 21, 2011Updated 14 years ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Postfix Add-on for Splunk (Compliant with the Mail CIM model)☆11Mar 18, 2021Updated 4 years ago
- some old code about scheme compiler I've ever wrote☆14Jun 21, 2025Updated 8 months ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- An implementation of Dijkstra in Clojure☆19Aug 7, 2012Updated 13 years ago
- A lightweight Python module to interact with the MITRE ATT&CK® Enterprise dataset. Built for speed with minimal dependencies. Read the do…☆11Nov 24, 2025Updated 3 months ago
- Retail is sth like linux command tail, and support "retail" which means one can tail a file use a pos file which saves the last read posi…☆12Jun 26, 2013Updated 12 years ago
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆12Oct 29, 2020Updated 5 years ago
- Web Service API for Hyperic HQ☆32Jul 6, 2022Updated 3 years ago
- 一个用来xss劫持会话利用的chrome插件☆13Sep 3, 2014Updated 11 years ago
- All you need to run HPE Vertica locally in VirtualBox☆11Apr 4, 2020Updated 5 years ago
- Shen on python.☆20Jul 27, 2014Updated 11 years ago
- Splunk app for visualization of DMARC RUA mails☆15Sep 26, 2025Updated 5 months ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- A simple IDS with statistical learning☆11Apr 19, 2024Updated last year
- create docset for Dash (http://kapeli.com/dash) with splunk search language☆15Sep 26, 2017Updated 8 years ago
- Orchestration Software for Incident Response☆14Updated this week
- a keep-alive agent for node http & https with a really snappy name☆32May 2, 2017Updated 8 years ago
- Asynchronous DNS query pipeline for Python☆10May 4, 2015Updated 10 years ago
- A series of demos showing how OpenStreetMap vector data can be displayed and manipulated in a browser using WebGL☆19Mar 29, 2017Updated 8 years ago
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- A tiger compiler using FLEX, BISON and LLVM☆11Jun 25, 2013Updated 12 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- ☆13Feb 6, 2018Updated 8 years ago