This tool will be invaluable for: SIEM Testing - Generate realistic multi-source logs Security Training - Reproducible scenarios for education Development - Consistent test data for log processing systems Research - Controlled log generation for cybersecurity studies
☆33Feb 11, 2026Updated last month
Alternatives and similar repositories for log-generator
Users that are interested in log-generator are comparing it to the libraries listed below
Sorting:
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- This script creates a webpage to show SCCM OSD Reporting☆18Jan 17, 2025Updated last year
- A repository of output using KAPE (!EZParser Module) for various publicly available forensic images!☆17Aug 31, 2024Updated last year
- ☆21May 8, 2022Updated 3 years ago
- 🌴 The STIX2 Pattern expression parser for humans☆26Jun 29, 2019Updated 6 years ago
- ☆24Jan 12, 2026Updated 2 months ago
- ☆12Dec 14, 2016Updated 9 years ago
- OASIS CTI TC: Provides issue tracking and wiki pages for the STIX 2.x Work Products☆26Sep 12, 2025Updated 6 months ago
- knityak code for generating art for knit scarves☆11Jun 17, 2019Updated 6 years ago
- Conference planning software☆12Feb 6, 2023Updated 3 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- Open source BaaS (backend as a service). Built with Laravel☆13Jan 24, 2018Updated 8 years ago
- Automated generation of powerpoint slides for fun and profit☆13Oct 18, 2017Updated 8 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Chrome extension that redacts potentially sensitive information before querying ChatGPT☆12Aug 10, 2023Updated 2 years ago
- Storage for the IOCs I collect☆11Mar 26, 2025Updated 11 months ago
- Pritunl Access Control System☆10Feb 16, 2023Updated 3 years ago
- Static analysis tool to Identify and Fix GitHub Actions prone to Supply‑Chain Risks☆14Dec 24, 2025Updated 2 months ago
- ☆10Jan 22, 2025Updated last year
- ☆16Nov 26, 2023Updated 2 years ago
- ☆11Updated this week
- A multi-domain RBAC authorization library in Golang. Focus on management of authorization business.☆16Mar 13, 2026Updated last week
- Arduino sketch, library, BOM, and Gerber files for i2/x2 Segway battery diagnostics☆27Aug 25, 2021Updated 4 years ago
- Documentation repository☆48Feb 11, 2026Updated last month
- Prompt-based pipeline for extracting procedural knowledge graphs from text with LLMs☆15Feb 17, 2026Updated last month
- A super quick way to update npm dependencies, via a code lens.☆18Feb 21, 2026Updated 3 weeks ago
- Collect AWS logs and query them instantly with SQL! Open source CLI. No DB required.☆16Updated this week
- The intake formats supported by SEKOIA.IO☆19Updated this week
- This hosts all queries created on the LD&R Forum☆13Feb 18, 2025Updated last year
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Web application to create indexes for GIAC certification examinations.☆151Apr 12, 2023Updated 2 years ago
- WISKESS automates the Windows evidence processing for Incident Response investigations. Rust version.☆16Oct 16, 2025Updated 5 months ago
- ☆18Jul 27, 2023Updated 2 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆113Jan 24, 2026Updated last month
- The client-side app for Filmstrip☆10Feb 17, 2017Updated 9 years ago
- Hardware design of the MCH2022 badge☆26Nov 10, 2022Updated 3 years ago