Generates logs of typical formats that would often be found in a SOC. As of 31st January 2023, it supports IDS, Web Access and Endpoint log formats. Can generate a specific number of events in a linear fashion or use a waveform to add 'bumpiness' to your data. The code is modular and extensible, adding additional formats can be done with relative ease.
Features
- The code is modular and extensible, adding additional formats can be done with relative ease
- Can generate a specific number of events in a linear fashion or use a waveform to add 'bumpiness' to your data
- Generates simulated events for log formats that would typically be found in a SOC
- As of 31st January 2023, it supports IDS, Web Access and Endpoint log formats
- Linux event logs
- Perimeter device logs (firewalls, vpns, proxies etc)
Categories
Log ManagementFollow Security Log Generator
Other Useful Business Software
Our Free Plans just got better! | Auth0
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of Security Log Generator!