studiawan / nerlogparserLinks
Automatic log parser to support forensic analysis
☆11Updated 6 years ago
Alternatives and similar repositories for nerlogparser
Users that are interested in nerlogparser are comparing it to the libraries listed below
Sorting:
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 3 years ago
- annotated dataset of cyber-security related tweets☆22Updated 4 years ago
- ☆25Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Updated 2 years ago
- ATLAS tactics, techniques, and case studies data☆78Updated 3 weeks ago
- NTFS file system specimens☆13Updated 2 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Updated last year
- Converting data from services like Censys and Shodan to a common data model☆50Updated 2 months ago
- Python library for parsing AccessData AD1 images☆33Updated 2 years ago
- macOS Artifact Intelligence Tool☆13Updated 6 years ago
- Python 3 library to build YARA rules.☆13Updated 3 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆18Updated last year
- A python library for building and using hash databases.☆22Updated 2 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Updated 3 years ago
- Yara rules☆22Updated 2 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 3 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- AFF4 Standard Documents☆29Updated 3 years ago
- ☆18Updated 7 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Updated last year
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Parser fo macOS/iOS FSEvents Logs☆37Updated last year
- This is a repository for reporting any issues in any of my software☆13Updated 7 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆13Updated this week
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- ☆20Updated last year
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- ☆21Updated 5 months ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆71Updated 3 months ago