Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   logs analysis
MalwLess Simulator Tool (MST).

MalwLess Simulator Tool (MST).

May 3, 2018
cydec
Code Scripting, Security Tools

MalwLess is a open source tool developed in C# for blue teams that allows you to test your SIEM and security systems. Basically you can…

Read Article →
ldsi - LogDissect Security Intelligence.

ldsi – LogDissect Security Intelligence.

March 15, 2018
ghost
Digital Forensics, Security Tools

LDSI is a SIEM (Security Information and Event Management system) written in Python Django. It features a web frontend, and handles log management and forensics,…

Read Article →
Pulse-monitor : A client + server tool to to log and rectify communications problems.

Pulse-monitor : A client + server tool to to log and rectify communications problems.

March 9, 2018
ghost
Code Scripting, Monitoring/System Administrator, Security Tools

The Heartbeat computer (server or client–doesn’t matter) delivers messages to a file on the Monitor computer via SSH. The Monitor checks the file and executes…

Read Article →
remediation - Tools and utilities for remediation and incident-response handling.

remediation – Tools and utilities for remediation and incident-response handling.

March 9, 2018
L3G10n
Digital Forensics, Firewall

remediation is a Tools and utilities for remediation and incident-response handling. JewelRunner is intended to quickly analyze tcp/ip traffic for a target host and create…

Read Article →
firecall - Automate SSH communications with firewall, switches, etc.

firecall – Automate SSH communications with firewall, switches, etc.

February 27, 2018
anon80
Code Scripting, Firewall

firecall scripts are designed to automate sending commands to a Cisco ASA firewall. The intended purpose here is to eliminate the need to manually log…

Read Article →
Natlog is a utility logging traffic through a firewall doing source natting.

Natlog is a utility logging traffic through a firewall doing source natting.

February 7, 2018
EL-Capitan
Firewall, Monitoring/System Administrator

Natlog is a utility logging traffic through a firewall that performs source-NATting (a.k.a. POSTROUTING). Firewalls like iptables usually offer POSTROUTING source network address translation facilities…

Read Article →
Get-Baseline : PowerShell Script for Agentless Incident Response.

Get-Baseline : PowerShell Script for Agentless Incident Response.

February 2, 2018
lee
Code Scripting, Digital Forensics, Networking

Get-Baseline is a wrapper PowerShell script for a number of functions that automates the initial tasks in an incident response scenario. Prerequisites: + on Targets:…

Read Article →
WireSpy (wsd) - captures packets and generates firewall rules and netflow logs.

WireSpy (wsd) – captures packets and generates firewall rules and netflow logs.

January 4, 2018
L3G10n
Firewall, Monitoring/System Administrator, Networking

What is wsd? Wirespy is a simple network sniffer for information security that extracts interesting metadata about network traffic and logs it. That sounds like…

Read Article →
1 2 … 4 Next →

Copyright © 2019

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools