Webhawk/Catch helps automatically finding web attack traces in logs
-
Updated
Jun 15, 2025 - Python
10000
Webhawk/Catch helps automatically finding web attack traces in logs
Shaley-Sand Log Analysis Tutorial using Waxman-Smits and Dual-Water
Django middleware and signals for handling security events
A cybersecurity solution that leverages the power of artificial intelligence and machine learning to accurately classify incoming network traffic based on the tactics employed by potential attackers. The system is trained using data gathered from a Cowrie honeypot deployed in the cloud.
This repository is not maintained. For the latest information, please refer to qsv-rs, which is a complete reimplementation in Rust.
Kubernetes configurations for deploying Elasticsearch and Kibana. Simplify log analysis with this scalable and efficient setup.
A python script to search a file for the user input | Return the previous, current and next line of the searched input | Write the current line into a new file
Estimating formation total porosity using Archie's Equation
Search Tail - A tail-like CLI tool with support for search and keyword highlighting
A fast, flexible, and memory-efficient command-line tool written in Rust for processing large CSV files.
Smart dashboard developed in MS Power BI to analyze and monitor logs of a specific bank department
A paper list of awesome research on load balancing monitoring data analysis, log analysis, decision scheduling, and AIOps.
Log Analysis of Telnet session hijacking via MAC address spoofing using cowrie Honeypots
This tool is designed to scan log files for various security events and present the findings in an easy-to-read table format directly in your terminal. It includes features for custom pattern detection and provides recommended remedies for detected issues.
LogGuardian is a Blue Team, log and config analyzer tool designed to help detect brute force attacks, misconfigurations, and other security events in real-time.
A Java-based application designed to streamline the process of filtering and analyzing server logs efficiently from MongoDB
"GuardianEye ππ: Empowering Cybersecurity with Advanced Keylogger β A robust defense system providing comprehensive monitoring of employee activities, capturing keystrokes, screenshots, application logs, and system logs for proactive threat detection and enhanced security insights in modern business operations. π‘οΈπ»
Add a description, image, and links to the loganalysis topic page so that developers can more easily learn about it.
To associate your repository with the loganalysis topic, visit your repo's landing page and select "manage topics."