Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

Prelude SIEM

Compare

  Analyzed about 13 hours ago

Prelude SIEM is a Security Information and Event Management system, for all available security application, opensource or proprietary, to report to a centralized system. In order to achieve this task, Prelude relies on the IDMEF (Intrusion Detection Message Exchange Format) IETF standard (RFC 4765) ... [More] , that enables different kinds of sensors to generate events using an unified language. Prelude SIEM benefits from its ability to find traces of malicious activity from different sensors (Snort, Suricata, OSSEC, Wazuh, honeyd, Samhain, over 30 types of systems logs, and others) in order to better verify an attack and in the end to perform automatic correlation between the various events. Prelude SIEM is commited to providing a SIEM that offers the ability to unify currently available tools. [Less]

451K lines of code

6 current contributors

over 3 years since last commit

12 users on Open Hub

Inactive
4.83333
   
I Use This

Bro

Compare

  No analysis available

0 lines of code

47 current contributors

0 since last commit

10 users on Open Hub

Activity Not Available
5.0
 
I Use This
Mostly written in language not available
Licenses: No declared licenses

Hachoir

Compare

  No analysis available

Hachoir is a library written in Python which allows to see and edit a binary file (or any binary stream) field per field. A field is the most basic information: a number, a string of characters, a flag (yes/no), etc. Only supported formats can be opened, it's not a magic tool. It can be used to ... [More] extract some information (eg. metadata), edit some fields of a file without the original program, or convert a file from one format to another. [Less]

0 lines of code

0 current contributors

0 since last commit

7 users on Open Hub

Activity Not Available
4.5
   
I Use This
Mostly written in language not available
Licenses: gpl

wazuh

Compare

  Analyzed 2 days ago

Wazuh - The Open Source Security Platform (OSSEC fork)

661K lines of code

0 current contributors

11 days since last commit

3 users on Open Hub

Very High Activity
0.0
 
I Use This
Licenses: No declared licenses

The Autopsy Forensic Browser

Compare

  No analysis available

The Autopsy Forensic Browser is a graphical interface to The Sleuth Kit and other analysis tools. It was designed to be an extensible platform so that it can be an end-to-end digital forensics solution that incorporates plug-in modules from both open and closed source projects.

0 lines of code

0 current contributors

0 since last commit

3 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: apache_ish

fpcgui

Compare

  Analyzed 3 days ago

PCGUI is a frontend to handle packet captures. Its aim is for Network Security Analysts who wants to have a non-commercial cheap storage for doing Network Forensics. It can uses daemonlogger/tcpdump/sancp for packet capturing and cxtracker for connection profiling. daemonlogger/tcpdump/sancp ... [More] is responsible for dumping pcaps to disk. cxtracker/sancp indexes connections, making them searchable. LAMP is used for GUI. to search up connections and carving out relevant pcaps. [Less]

1.47K lines of code

0 current contributors

about 14 years since last commit

2 users on Open Hub

Inactive
0.0
 
I Use This

Fedora Security Lab

Compare

  Analyzed 3 days ago

The Fedora Security Spin provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies in universities and other organizations. The spin is maintained by a community of security testers and developers. It comes with the clean ... [More] and fast LXDE Desktop Environment and a customized menu that provides all the instruments needed to follow a proper test path for security testing or to rescue a broken system. The Live image has been crafted to make it possible to install software while running, and if you are running it from a USB stick created with LiveUSB Creator using the overlay feature, you can install and update software and save your test results permanently. [Less]

8.25K lines of code

0 current contributors

about 1 year since last commit

2 users on Open Hub

Very Low Activity
0.0
 
I Use This

Volatility

Compare

  Analyzed 4 days ago

The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated ... [More] but offer unprecedented visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research. [Less]

614K lines of code

11 current contributors

over 3 years since last commit

2 users on Open Hub

Inactive
0.0
 
I Use This

python-haystack

Compare

  Analyzed 3 days ago

Search C Structures in a process' memory Keywords: memory,analysis,forensics,struct,ptrace

26.1K lines of code

0 current contributors

over 6 years since last commit

1 users on Open Hub

Inactive
5.0
 
I Use This

iPhone Backup Analyzer

Compare

  Analyzed 3 days ago

iPhone Backup Analyzer is an utility designed to allow the user to simply browse through the contents of the backup folder of an iPhone (or any other iOS device). Read configuration files, browse archives and lurk into databases, and so on... Provides a plugin framework to develop viewers for ... [More] specific contents (text messages, browser history, application specific data....) [Less]

4.74K lines of code

0 current contributors

over 11 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This