asteroza + log   165

insanitybit/grapl: Graph platform for Detection and Response
Stuff logs into this for tracing/hunting, soon to have some D3 for visualizing things in the Jupyter notebook?
DFIR  log  analysis  graph  database  security  hacking  pentesting  D3.js  Jupyter 
june 2019 by asteroza
fireeye/SilkETW
Adapter for simplifying ETW log collection
silkETW  ETW  log  trace  transform  filter  software  opensource  FireEye  adapter  C#  wrapper  security 
march 2019 by asteroza
"Six steps to #blueteam progress:"
How to check if your defense stance is not made of FAIL
EDR  network  log  testing  test  security  hacking  pentesting  SIEM  logging  humor  DFIR 
march 2019 by asteroza
4964(S) Special groups have been assigned to a new logon. (Windows 10) | Microsoft Docs
Throwing important AD users into a special security audit group will raise security events in the event log to allow easier tracking. Useful for exploring an environment where people have hard coded certain accounts or registered a task/service with an inappropriate account
windows  AD  active  directory  special  user  login  audit  security  group  event  log  hacking  pentesting  defense  WEFFLES 
november 2018 by asteroza
SetupDiag | Microsoft Docs
handy tool for diagnosing windows 10 upgrade errors, as this will parse the logs
windows  10  sysadmin  tips  tricks  software  upgrade  setup  log  parser  debug 
october 2018 by asteroza
Remote Authentication GeoFeasibility Tool - GeoLogonalyzer « Remote Authentication GeoFeasibility Tool - GeoLogonalyzer | FireEye Inc
interesting additional analysis of remote access logs based on GeoIP as well as physical realities (nobody flying commercial supersonic flights so logon locations being too far within a fixed timespan will be suspicious...)
FireEye  geoIP  GeoLocation  location  remote  access  VPN  log  logon  analysis  security  defense 
june 2018 by asteroza
Script Get-USBHistory
powershell script, useful for grabbing USB history from all PC's in a domain, useful for creating a baseline/history of USB use.
windows  USB  history  log  PowerShell  script  sysadmin  tips  tricks  logging  baseline  security  audit  auditing 
may 2018 by asteroza
Pricing | Librato
interesting pricing model, allow high resolution log sending, but if you need low rez for some hosts, then you pay for the low rez storage.
cloud  log  monitoring  service 
september 2017 by asteroza
GoAccess - Visual Web Log Analyzer
sorta realtime web server log analyzer, can cover Squid in a pinch
realtime  web  server  log  analyzer  software  opensource 
august 2017 by asteroza
LogSentinel (alpha) - Blockchain-inspired secure audit trail service
sorta like a timestamping service, but who is doing the blockchain really?
blockchain  log  audit  trail  service  hash  security 
july 2017 by asteroza
Worksmart — Crossover
Welcome to white collar hell, where they cap your screen every 10, and use the webcam to check if you are seated there.
WorkSmart  remote  worker  monitoring  security  time  logging  screenshot  webcam  capture  application  log  HR  team  outsourcing  management  Delicious 
may 2017 by asteroza
Kindling Cracker | The world's safest wood chopper – Kindling Cracker Ltd
Smart little wood splitter, though I suspect a wider base would be a little safer.
wood  log  cracker  splitter  kindling  outdoor  hardware  tools  camping  Delicious 
january 2017 by asteroza
« earlier      
per page:    204080120160

related tags

2.0  3d  8.1  accelerated  access  accesspoint  active  AD  adapter  address  administration  agent  aggregation  aggregator  aid  ajax  alert  algorithm  alternative  amazon  analysis  analytics  analyzer  android  angel  apache  Apache2GDL  ApachePong  APM  app  append  apple  appliance  application  archival  archive  archiving  asp.net  ASP.NETcore  assistance  assurance  attack  audit  auditd  auditing  auralization  auralizer  automated  automatic  automation  automobile  automotive  avro  AWS  Azure  backend  baseline  behaviour  big  bigdata  block  blockchain  blocking  blueteam  bluetooth  breach  breadcrumb  brother  browser  buffer  button  C#  cache  Calamaris  calendar  call  camera  campfire  camping  capture  car  CATT  CD  cellhpone  cellphone  censorship  certificate  chart  chat  cheatsheet  checkpoint  china  chrome  CLI  cloud  cloudwatch  cluster  collection  collector  commit  comparision  compliance  computing  configuration  console  consolidated.db  consumer  continuous  Controlguard  controller  conversation  converter  correlation  counter  cracker  crate  credential  cryptography  CT  cyber  D3.js  dashboard  data  database  datamining  DAVIX  DC  debug  debugging  decryption  defense  definition  Delicious  delivery  deobfuscation  Desthino  detection  developer  development  devices  devops  DFIR  directed  directory  disable  discourse  distributed  distribution  DNS  docker  documentation  domain  Dragonfly  drone  earth  editing  EDR  education  EIM  elasticsearch  electronics  ELK  ELSA  emergency  endpoint  engine  enterprise  Epilog  error  essay  ETW  europe  event  eventID  evidence  exploit  explorer  export  facebook  Facetime  file  filesystem  filetype:pdf  filter  filtering  fire  FireEye  firelog  firewire  firewood  flight  forensic  format  forwarder  forwarding  france  free  FreeBSD  frontend  fuel  FUSE  ganglia  gargoyle  gas  GEM  generic  geoIP  geolocation  git  global  glTail  go  goggles  google  GPGPU  GPS  GPU  graph  graphing  greynet  group  GSN  GUI  guide  hack  hacking  hadoop  HAMMER  hardware  hash  heatmap  high  history  honeypot  hosted  hosting  howto  HR  HTTPS  human  humor  hunting  ID  IDS  IM  immutable  incident  information  infoviz  ingestion  input  instant  interface  internal  internet  investigation  IoC  IP  iPhone  iPhoneTracker  IPS  IR  IrDA  IT  japan  java  javascript  JSON  Jupyter  kafka  Karelog  keyword  kindling  kinesis  labs  lambda  large  lateral  LBS  leak  leakage  learning  library  license  life  LightSquid  linux  live  liveCD  LMDB  location  log  Log.io  log4net  LogEarth  logfile  logging  login  logon  LogsDB  logstash  Logstorage  mac  machine  malware  management  manager  manifest  map  mapping  mapreduce  mashup  measurement  media:document  memory  mesh  message  messaging  method  metrics  microsoft  mind  Minos  mission  ML  moderation  monitoirng  monitor  monitoring  movement  MPI  MRTG  munin  MyLogStar  MySQl  name  NBA  network  NILFS  node.js  noob  novelty  NSA  NTFS  NTT  observability  online  opensource  ORLY  OSINT  OSSIM  OSX  outage  outdoor  output  outsourcing  owl  p2p  PaaS  PAL  panic  parallel  parser  parsing  password  penetration  pentest  pentesting  performance  perl  personal  pgwatch  Picviz  pipeline  pivot  Piwik  planning  platform  playbook  policy  pong  port  postgres  postgreSQL  PostgreSQL  powershell  predator  preprocessing  preprocessor  presentation  privacy  processing  productivity  profile  profiling  programming  project  proxy  pubsub  python  Q1  query  rails  rayon  RDP  realtime  recerence  recon  record  recorder  recording  recovery  redteam  reference  regex  registry  remediation  remote  replay  reporting  rescue  research  response  retrieval  review  rich  RMagick  RocksDB  RoR  router  rsyslog  ruby  rust  S3  SaaS  Saas  safety  sample  scalability  SCCM  schedule  schema  screenshot  script  scripting  scriptkiddy  SD  search  secure  security  SEM  sensor  sentinel  sequential  series  server  service  setup  sharing  shell  SIEM  sigma  silkETW  SIM  SIP  skull  skyhook  skype  SLAX  slog  smartphone  snapshot  snapshotting  Snare  SNMP  Snorby  Snort  Socket.IO  software  solution  sonification  sound  special  splitter  splunk  spraying  spyware  SQL  squid  ssh  SSL  stack  statistical  statistics  steaming  storage  store  stream  streaming  structure  structured  stunt  subdomain  subscription  supplement  support  sysadmin  syscall  syslog  sysmon  system  tail  team  telemetry  telltale  template  test  testing  text  threat  time  timesheet  tips  TLS  tools  tower  trace  tracing  track  tracking  traffic  trail  transform  transparency  transparent  transport  trap  tricks  trigger  tripwire  troubleshooting  turbine  tutorial  typing  UAV  unix  upgrade  urban  usability  usage  USB  user  USN  utilities  utilties  video  view  viewer  virtual  vista  visual  visualization  visualizer  vlog  vlogging  VM  VoIP  VPN  vulnerability  waypoint  web  webcam  webdev  webGL  website  WEFFLES  WELM  wifi  windows  WLS  WMI  wood  wooden  work  worker  WorkSmart  wrapper  writing  XML 

Copy this bookmark:



description:


tags: