Displaying 1 to 20 from 43 results

angulartics - Analytics for AngularJS applications.

  •    Javascript

**Note: we are dropping support for NuGet.You can also use $analyticsProvider.withBase(true) instead of $analyticsProvider.withAutoBase(true) if you are using a <base> HTML tag.

angulartics2 - Vendor-agnostic analytics for Angular2 applications.

  •    TypeScript

Pass string literals or regular expressions to exclude routes from automatic pageview tracking.By default, it removes IDs matching this pattern (ie. either all numeric or UUID) : ^\d+$|^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}$.

sigma - Generic Signature Format for SIEM Systems

  •    Python

Sigma is a generic and open signature format that allows you to describe relevant log events in a straight forward manner. The rule format is very flexible, easy to write and applicable to any type of log file. The main purpose of this project is to provide a structured form in which researchers or analysts can describe their once developed detection methods and make them shareable with others. Sigma is for log files what Snort is for network traffic and YARA is for files.

gnomock - Test your code without writing mocks with ephemeral Docker containers 📦 Setup popular services with just a couple lines of code ⏱️ No bash, no yaml, only code 💻

  •    Go

Gnomock is an integration and end-to-end testing toolkit. It uses Docker to create temporary containers for application dependencies, setup their initial state and clean them up in the end. Gnomock allows to test the code with no mocks wherever possible. The power of Gnomock is in a variety of Presets, each implementing a specific database, service or other tools. Each preset provides ways of setting up its initial state as easily as possible: SQL schema creation, test data upload into S3, sending test events to Splunk, etc.

serilog-sinks-splunk - A Serilog sink that writes to Splunk

  •    CSharp

A Serilog sink that writes events to the Splunk. Supports .NET 4.5+, .NET Core, and platforms compatible with the .NET Platform Standard 1.1 including Windows 8 & UWP, Windows Phone and Xamarin.More information is available on the wiki.

vagrant-ids - An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk

  •    Shell

Suricata is configured to startup using the sole "ens32" interface. Rules are stored in /etc/suricata/rules.After installation, Suricata will perform two curl commands to ensure that the detection engine and logging are functioning properly. However, please note that the vagrant build will continue even if the tests fail.

splunk-bunyan-logger - A Bunyan stream for Splunk's HTTP Event Collector

  •    Javascript

This project provides a Bunyan stream for HTTP Event Collector in Splunk Enterprise and Splunk Cloud. First, update npm to the latest version by running: sudo npm install npm -g.

splunk-javascript-logging - Splunk HTTP Event Collector logging interface for JavaScript

  •    Javascript

This project provides a simple JavaScript interface for logging to HTTP Event Collector in Splunk Enterprise and Splunk Cloud. Stay connected with other developers building on Splunk software.

splunk-webframework - Splunk Web Framework

  •    Python

The Splunk Web Framework lets developers quickly create custom Splunk apps by using prebuilt components, styles, templates, and reusable samples, and by adding custom logic, interactions, and UI. Applications developed with the Web Framework work seamlessly side by side with current Splunk applications. The Splunk Web Framework uses the Django web framework, the Splunk SDK for Python, and the Splunk SDK for JavaScript. The Web Framework also depends on a few JavaScript libraries for the client-side of code, such as Backbone.js for eventing, and jQuery for working with the document object model (DOM).

winston-splunk - A plugin for the nodejs logger winston to send data to Splunk

  •    Javascript

A splunk transport for winston. Inspired by winston-greylog2. This project is no longer maintained. Feel free to fork.

node-telemetry - a simple telemetry server written in Node.js

  •    Javascript

The goal of node-telemetry is to make it really easy to deploy a scalable telemetry server in a clustered environment. This can be used to capture errors, performance data, and more from your web and mobile applications, and store it in a document store or on the filesystem. node-telemetry is released under the terms of the MIT license.

kafka-connect-splunk - Kafka Connect connector for receiving data and writing data to Splunk.

  •    Java

This connector allows Kafka Connect to emulate a Splunk Http Event Collector. This connector support receiving data and writing data to Splunk. The Sink Connector will transform data from a Kafka topic into a batch of json messages that will be written via HTTP to a configured Splunk Http Event Collector.

wazuh-splunk - Wazuh - Splunk app

  •    Javascript

Wazuh app for Splunk offers an option to visualize Wazuh Alerts and API data. Wazuh helps you to gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and application level. If you want to contribute to our project please don't hesitate to send a pull request. You can also join our users mailing list, by sending an email to mailto:wazuh+subscribe@googlegroups.com, to ask questions and participate in discussions.

log4net.Appender.Splunk - A log4net appender for Splunk Http Event Collector (HEC) Sender

  •    CSharp

Feel free to tweet @alanbarber for questions or comments on the code. You can also submit a GitHub issue here.

NLog.Targets.Splunk - A NLog target for Splunk Http Event Collector (HEC) Sender

  •    CSharp

Feel free to tweet @alanbarber for questions or comments on the code. You can also submit a GitHub issue here.

SplunkLogger - C# .Net Core 2 Splunk ILogger Compatible Implementation

  •    CSharp

This is a C# .Net Core 2 ILogger implementation developed by VTEX developer Caldas to send data to Splunk. You can provide the configuration from json file using .Net Core 2 configuration binding feature.

app_splunk_sysmon_hunter - Splunk App to assist Sysmon Threat Hunting


Download and deploy this app to your Splunk Search Head. A macro is used for all saved searches, you will need to modify it for your environment to ensure the proper Sysmon sourcetype/index is searched.

sysmon-splunk-app - Sysmon Splunk App


This is combined Splunk App effort between @jarrettp and @m_haggis. Download and deploy this app to your Splunk Search Head.

We have large collection of open source products. Follow the tags from Tag Cloud >>

Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.