{"id":17605030,"url":"https://github.com/hrvolapeter/security-log","last_synced_at":"2025-07-25T04:37:21.812Z","repository":{"id":114846028,"uuid":"93339211","full_name":"hrvolapeter/security-log","owner":"hrvolapeter","description":"High performance, attack detection from web server logs.","archived":false,"fork":false,"pushed_at":"2019-05-16T10:24:17.000Z","size":57,"stargazers_count":11,"open_issues_count":0,"forks_count":3,"subscribers_count":2,"default_branch":"master","last_synced_at":"2025-02-25T06:51:16.366Z","etag":null,"topics":["analyzer","apache","attack-detection","fast","haskell","logs","nginx","object-reference","real-time","security","security-tools","sql-injection","xss-detection"],"latest_commit_sha":null,"homepage":"","language":"Haskell","has_issues":false,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/hrvolapeter.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"security-log.cabal","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2017-06-04T20:21:16.000Z","updated_at":"2024-07-01T14:03:36.000Z","dependencies_parsed_at":null,"dependency_job_id":"efe30f6d-a085-4698-a1d6-6d0ecc5ee8d5","html_url":"https://github.com/hrvolapeter/security-log","commit_stats":null,"previous_names":[],"tags_count":2,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hrvolapeter%2Fsecurity-log","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hrvolapeter%2Fsecurity-log/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hrvolapeter%2Fsecurity-log/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hrvolapeter%2Fsecurity-log/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/hrvolapeter","download_url":"https://codeload.github.com/hrvolapeter/security-log/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":242640885,"owners_count":20162051,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["analyzer","apache","attack-detection","fast","haskell","logs","nginx","object-reference","real-time","security","security-tools","sql-injection","xss-detection"],"created_at":"2024-10-22T14:43:29.042Z","updated_at":"2025-03-09T03:31:29.611Z","avatar_url":"https://github.com/hrvolapeter.png","language":"Haskell","readme":"# Security log 🔒🔒🔒\n[![Build Status](https://travis-ci.org/retep007/security-log.svg?branch=master)](https://travis-ci.org/retep007/security-log)\n[![Coverage Status](https://coveralls.io/repos/github/retep007/security-log/badge.svg?branch=master)](https://coveralls.io/github/retep007/security-log?branch=master)\n\nSecurity log is a high performence access log analyzer for OWASP TOP 10 attacks (well only part that can be detected from access logs 😉). This project was created as part of my bachelor thesis.\n\n[Download](https://github.com/retep007/security-log/archive/latest.zip) precompiled binary for Ubuntu\n\n## Contents\n- [Features](#features)\n- [Options](#options-%EF%B8%8F)\n- [Building from source](#building-from-source)\n\n## Features \n- analyse web access logs\n- nginx / apache format\n- reading from file or elasticsearch\n- reporting using email ✉️\n- running as a daemon 👻 \n\n## Options ⌨️\nConfigurable using config stored in `/etc/security-log/config.yaml`\n\n**Input types:** 🕸\n\n* 🕵️ elasticsearch\n* 📂 file path\n\n**Output types / Incident reporting** #️⃣\n\n* ➥ std\n* ✉️ email\n\n**Server type**\n\n* nginx\n* apache\n\n\nApache, elasticsearch with output to std\n```markdown\ntag: Config\nserverType: Apache\ninput:\n  tag: Elastic\n  size: 10\n  ip: http://localhost:9200\noutput:\n  tag: Std\nasDaemon: false\n```\n\nNginx, file, with output to email runing as daemon\n```markdown\ntag: Config\nserverType: Nginx\ninput:\n  tag: File\n  content: /logs/apache/acces_log\noutput:\n  tag: Email\n  content: test@me.com\nasDaemon: true\n```\n\n## Building From Source\nInstall haskell [stack](https://docs.haskellstack.org/en/stable/install_and_upgrade/) with ```bash\ncurl -sSL https://get.haskellstack.org/ | sh\n```\nCompile using ```bash\nstack build\n```","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhrvolapeter%2Fsecurity-log","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fhrvolapeter%2Fsecurity-log","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhrvolapeter%2Fsecurity-log/lists"}