soprasteria / cybersecurity-miwLinks
Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis
☆32Updated 7 years ago
Alternatives and similar repositories for cybersecurity-miw
Users that are interested in cybersecurity-miw are comparing it to the libraries listed below
Sorting:
- A project that implements statistical methods for identifying anomalous files☆22Updated 10 years ago
- MITIE: library and tools for information extraction☆29Updated 10 years ago
- not the worst forensics regexp—this is not the primary repo; caveat programmer☆29Updated 6 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- Hadoop MapReduce over Hive based implementation of attributed network pattern matching.☆40Updated 10 years ago
- Facet Search interface for MEMEX.☆13Updated 10 years ago
- ☆9Updated 9 years ago
- OpenGraphiti Project : Data Visualization Framework☆98Updated 8 years ago
- Time-Machine Dynamic Bulk Packet Recorder☆36Updated 2 months ago
- Set of scripts to index PCAP files and retrieve packets☆14Updated 9 years ago
- Fast multipattern regular expression searching for digital forensics☆17Updated 5 years ago
- SPL to lucene translator☆15Updated 10 years ago
- The Compressed Pcap Packet Indexing Program☆27Updated 9 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 9 years ago
- Meeting notes☆15Updated 9 years ago
- Realtime and Online Model Development Framework☆27Updated 8 years ago
- Passivedns monitor implementation in Rust.☆12Updated 9 years ago
- Open source software for image correlation, distance and analysis☆61Updated 2 years ago
- Data package with attacks against civil society☆13Updated 9 years ago
- Domain name classifier looking for good vs. possibly malicious providers☆33Updated 7 years ago
- POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation,…☆79Updated 10 years ago
- Farsight Security Blog code☆9Updated last year
- Code for Rumal Backend that will interface with Thug Daemon☆11Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Simple NGram Fast Indexer & Searcher☆37Updated 2 years ago
- YAPDNS☆39Updated 10 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 9 years ago
- A SSH Server in Go that logs username/password combos☆37Updated 6 months ago