Webhawk/Catch helps automatically finding web attack traces in logs
-
Updated
Apr 19, 2024 - Python
Webhawk/Catch helps automatically finding web attack traces in logs
Django middleware and signals for handling security events
Shaley-Sand Log Analysis Tutorial using Waxman-Smits and Dual-Water
A cybersecurity solution that leverages the power of artificial intelligence and machine learning to accurately classify incoming network traffic based on the tactics employed by potential attackers. The system is trained using data gathered from a Cowrie honeypot deployed in the cloud.
A python script to search a file for the user input | Return the previous, current and next line of the searched input | Write the current line into a new file
A paper list of awesome research on load balancing monitoring data analysis, log analysis, decision scheduling, and AIOps.
Kubernetes configurations for deploying Elasticsearch and Kibana. Simplify log analysis with this scalable and efficient setup.
Estimating formation total porosity using Archie's Equation
Search Tail - A tail-like CLI tool with support for search and keyword highlighting
Smart dashboard developed in MS Power BI to analyze and monitor logs of a specific bank department
A tool that provides elastic and rapid filtering for efficient analysis of huge CSV files, such as eventlogs.
"GuardianEye ππ: Empowering Cybersecurity with Advanced Keylogger β A robust defense system providing comprehensive monitoring of employee activities, capturing keystrokes, screenshots, application logs, and system logs for proactive threat detection and enhanced security insights in modern business operations. π‘οΈπ»
A Java-based application designed to streamline the process of filtering and analyzing server logs efficiently from MongoDB
Add a description, image, and links to the loganalysis topic page so that developers can more easily learn about it.
To associate your repository with the loganalysis topic, visit your repo's landing page and select "manage topics."