Log Analysis

Explore 56 curated cybersecurity tools, with 14,519+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

StreamAlert Logo

Serverless, real-time data analysis framework for incident detection and response.

0
Blauhaunt Logo

A tool collection for filtering and visualizing logon events, designed for experienced DFIR specialists in threat hunting and incident response.

0
aws-logsearch Logo

A command-line tool for searching AWS CloudWatch logs using pattern matching with configurable parameters for log groups, time ranges, and regions.

0
Honeyd Tools Logo

A collection of tools that can be used with Honeyd for data analysis or other purposes

0
Cowralyze Logo

A command-line tool for analyzing Cowrie honeypot log files over time, generating statistics and visualizations from local or remote log data.

0
honeyssh Logo

Honey-Pod for SSH that logs username and password tries during brute-force attacks.

0
Graylog Logo

Graylog offers advanced log management and SIEM capabilities to enhance security and compliance across various industries.

0
msticpy Logo

msticpy is a Python library for InfoSec investigation and threat hunting in Jupyter Notebooks, providing data querying, threat intelligence enrichment, analysis capabilities, and interactive visualizations.

0