Public Security Log Sharing Site by Dr. Anton Chuvakin Logo

Public Security Log Sharing Site by Dr. Anton Chuvakin

0
Free
Visit Website

This site contains various free shareable log samples from various systems, security and network devices, applications, etc. The logs are collected from real systems, some contain evidence of compromise and other malicious activity. Logs are NOT sanitized, anonymized, or modified in any way. License/permission to use: public; use for whatever you want. Acknowledging the source - this site and chuvakin.org would be very nice; Beerware license is even better. Logs currently shared include Linux logs, Apache web server logs, Sendmail, Squid, etc.

FEATURES

ALTERNATIVES

Converts Sigma and Yara rules to CRYPTTECH's SIEM query language.

Free

A Security Information and Event Management (SIEM) system with a focus on security and minimalism.

Free

A cloud-native SIEM platform that provides security analytics, intuitive workflow, and simplified incident response to help security teams defend against cyber threats.

Commercial

A toolset for collecting and processing netflow/ipfix and sflow data from netflow/sflow compatible devices.

Free

Sysdig is a system visibility tool with native container support.

Free

A community-led project focused on standardizing security event logs.

Free

Apache Metron is a centralized tool for security monitoring and analysis that integrates various open-source big data technologies.

Free

Browse a library of EQL analytics now natively integrated in Elasticsearch.

Free

PINNED

InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Commercial
Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Free
Resources
Kriptos Logo

Kriptos

An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

Commercial
Data Protection
System Two Security Logo

System Two Security

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Commercial
Security Operations
Aikido Security Logo

Aikido Security

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Commercial
Application Security
Permiso Logo

Permiso

Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Commercial
IAM
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Commercial
Cloud Security
Adversa AI Logo

Adversa AI

Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.

Commercial
AI Security