studiawan / nerlogparserLinks
Automatic log parser to support forensic analysis
☆11Updated 7 years ago
Alternatives and similar repositories for nerlogparser
Users that are interested in nerlogparser are comparing it to the libraries listed below
Sorting:
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 3 years ago
- Python 3 library to build YARA rules.☆13Updated 4 years ago
- ☆20Updated 2 years ago
- Command line utility and Python package to ease the (un)mounting of forensic disk images☆124Updated 2 years ago
- Remotely collect linux live forensics artifacts.☆13Updated 3 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- AFF4 Standard Documents☆29Updated 3 years ago
- Converting data from services like Censys and Shodan to a common data model☆50Updated last month
- ☆25Updated 2 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Updated last year
- Yara rules☆22Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆14Updated last year
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆69Updated 2 months ago
- ☆18Updated 7 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- ☆18Updated 9 months ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆71Updated 3 months ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆21Updated 4 years ago
- Module(s) related to reading SEGB (fka "Biome") data from iOS, mascOS, etc.☆27Updated 3 months ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Updated 3 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 5 years ago
- Dockerized REST service to look up URLs in Google Safe Browsing v4 API☆76Updated 3 years ago
- Volumetric Development☆11Updated last year
- ☆63Updated 4 years ago
- ATLAS tactics, techniques, and case studies data☆94Updated 2 weeks ago
- Utility for parsing Bro log files into CSV or JSON format☆42Updated 2 years ago
- ☆30Updated 7 years ago
- ☆24Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Updated last year