Analyzing logs to detect bugs in application
-
Updated
Oct 19, 2018 - Python
In computing, logging is the act of keeping a log of events that occur in a computer system, such as problems, errors or just information on current operations.
Analyzing logs to detect bugs in application
Automated cybersecurity log analysis and alert system using Termux and Python — Google Certified hands-on project with SIEM, threat detection, and Blue Team tools.
Simulated incident response to phishing, credential theft, and lateral movement attack.
Logstash filter to format log data
PowerShell Module for Threat Hunting via Windows Event Logs by Eric Conrad.
This project demonstrates setting up and monitoring a security environment using Splunk.
AI-powered tool to clean, summarize, and explain raw log files using Gemini and Firebase.
LogTool is an advanced toolkit, developed in PowerShell, for the collection, analysis, and reporting of Windows Event Logs, with a focus on security and efficiency.
A Rust tool to check if IP addresses from PostgreSQL logs are private or public.
🔍 MCP server for searching WhatsApp connector platform logs with natural language queries. Built with NestJS for any LLM's (Claude Code, Gemini, Chatgpt).
Tool for analyzing news data provided by Udacity.
This is a repository for the "Logs Analysis" udacity project which is the third project required for completing the Udacity Full Stack Web Developer Nanodegree program.
In this project, we will upload sample DHCP log files to Splunk SIEM and perform various analyses to gain insights into IP address assignment within the network.
Python script that reads mock security logs, detects suspicious patterns (e.g., brute force, failed logins, blacklisted IPs), and raises alerts.
“PhishEye – A phishing email analyzer with risk scoring and visualization dashboard (educational use only).”
A real-time Mini SOC system for log analysis, threat detection, and alert visualization-built with Python, Flask & threat intel.
The Project shows how we can upload sample FTP log files to Splunk SIEM and perform various analyses to gain insights into FTP activity within the network.
Advanced security analysis tool that correlates multi-source logs to detect, visualize, and analyze cyber attack patterns
Severity-Oriented Multiclass Drone Flight Logs Anomaly Detection
This lab provides a hands-on opportunity to learn security automation and orchestration concepts through a simulated scenario. It's like a flight simulator for security operations - it creates a controlled environment where learners can practice skills safely.