Generates logs of typical formats that would often be found in a SOC. As of 31st January 2023, it supports IDS, Web Access and Endpoint log formats. Can generate a specific number of events in a linear fashion or use a waveform to add 'bumpiness' to your data. The code is modular and extensible, adding additional formats can be done with relative ease.
Features
- The code is modular and extensible, adding additional formats can be done with relative ease
- Can generate a specific number of events in a linear fashion or use a waveform to add 'bumpiness' to your data
- Generates simulated events for log formats that would typically be found in a SOC
- As of 31st January 2023, it supports IDS, Web Access and Endpoint log formats
- Linux event logs
- Perimeter device logs (firewalls, vpns, proxies etc)
Categories
Log ManagementFollow Security Log Generator
Other Useful Business Software
Network Discovery Software | JDisc Discovery
JDisc Discovery is a comprehensive network inventory and IT asset management solution designed to help organizations gain clear, up-to-date visibility into their IT environment. It automatically scans and maps devices across the network, including servers, workstations, virtual machines, and network hardware, to create a detailed inventory of all connected assets. This includes critical information such as hardware configurations, software installations, patch levels, and relationshipots between devices.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of Security Log Generator!