studiawan / nerlogparserLinks
Automatic log parser to support forensic analysis
☆11Updated 7 years ago
Alternatives and similar repositories for nerlogparser
Users that are interested in nerlogparser are comparing it to the libraries listed below
Sorting:
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 3 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 5 years ago
- Converting data from services like Censys and Shodan to a common data model☆51Updated last week
- macOS Artifact Intelligence Tool☆13Updated 6 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 3 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Updated last year
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 3 years ago
- ☆25Updated 2 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Updated 4 months ago
- NTFS file system specimens☆13Updated 2 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆70Updated 3 months ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Updated last week
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 5 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Updated 3 years ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 2 weeks ago
- Yara rules☆22Updated 2 years ago
- A python library for building and using hash databases.☆22Updated 2 years ago
- ☆24Updated 3 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Updated last year
- CyCAT.org taxonomies☆15Updated 4 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Updated last year
- The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential …☆39Updated 12 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Updated 3 years ago
- ☆20Updated 2 years ago
- ☆18Updated 7 years ago
- Transform EQL detection rules to VQL artifacts☆12Updated 4 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Updated 3 weeks ago
- Specifications used in the MISP project including MISP core format☆53Updated 3 weeks ago
- Python module to use the MISP Taxonomies☆31Updated 3 weeks ago