www.logs.to Open in urlscan Pro
2606:4700:3031::6815:4977  Public Scan

URL: https://www.logs.to/
Submission: On April 29 via manual from FR — Scanned from FR

Form analysis 1 forms found in the DOM

POST /

<form action="/" method="post" id="generate" class="cst-form" novalidate="">
  <div class="row">
    <div class="col-lg-6">
      <div class="form-wrapper">
        <div class="form-group">
          <label>1. Select logging devices</label>
          <div id="output" class="choose-output"></div>
          <select data-placeholder="Type here to find device" id="log_devices" name="log_devices" multiple="" class="chosen-select form-control" onchange="checkLogging()" required="" style="display: none;">
            <option value=""></option>
            <option value="asa">Cisco ASA</option>
            <option value="ise">Cisco ISE</option>
            <option value="msata">Microsoft ATA</option>
            <option value="mswin">Microsoft Windows</option>
            <option value="swift">Swift Alliance Access</option>
          </select>
          <div class="chosen-container chosen-container-multi" title="" id="log_devices_chosen" style="width: 540px;">
            <ul class="chosen-choices">
              <li class="search-field">
                <input class="chosen-search-input default" type="text" autocomplete="off" value="Type here to find device" style="width: 173.656px;">
              </li>
            </ul>
            <div class="chosen-drop">
              <ul class="chosen-results"></ul>
            </div>
          </div>
        </div>
        <p id="errorLogging" style="color: red; font-size: small;"></p>
        <div class="form-group">
          <label>2. Select date time range </label>
          <input type="text" class="form-control calendar" name="date_range" id="date_range">
        </div>
        <div class="form-group">
          <label for="validationCustom02"> 3. Number of Log lines <span class="tool" data-tip="You can generate upto 30,000 log lines per device" tabindex="1"><img style="cursor: pointer; vertical-align: middle" src="/static/images/help.svg"
                alt="You can generate upto 30,000 log lines per device" data-pagespeed-url-hash="905564020" onload="pagespeed.CriticalImages.checkImageForCriticality(this);">
            </span></label>
          <input type="text" class="form-control" id="validationCustom02required" required="" placeholder="You can generate from 10000 to 30,000 log lines" name="log_lines" value="10000">
          <div id="inavlid-feed" style="font-size: small;"></div>
          <div class="invalid-feedback"> You can generate from 10000 to 30,000 log lines </div>
        </div>
        <div class="form-group">
          <label>4. Introduce Threat Context </label>
          <div id="output2" class="choose-output"></div>
          <select data-placeholder="Type here to find threat contexts" id="threat_contexts" name="threat_contexts" multiple="" class="chosen-select2 form-control" style="display: none;">
            <option value=""></option>
            <option value="c&amp;c_4624">Command &amp; Control RDP</option>
            <option value="c&amp;c_5156">Command &amp; Control RDP Tunneling</option>
            <option value="ca_acl_forcepwd">Credential Access - ACL Forcepwd</option>
            <option value="ca_chrome">Credential Access - Chrome Firefox Opera</option>
            <option value="ca_dc_sync">Credential Access - DC Sync</option>
            <option value="ca_hashdump">Credential Access - Hashdump lsass access</option>
            <option value="fw_deny">Excessive Firewall Denies</option>
            <option value="lm_4624_mimikatz">Lateral Movement - Mimikatz</option>
            <option value="lm_net_share">Lateral Movement - Net Share Drive</option>
            <option value="lm_remcom">Lateral Movement - REMCOM</option>
            <option value="lm_psexecsvc">Lateral Movement - Renamed psexecsvc</option>
            <option value="lm_schd_task_atsvc">Lateral Movement - Scheduled Task ATSVC</option>
            <option value="lm_4624_4688">Lateral Movement - Target Host</option>
            <option value="lm_wmic_4648">Lateral Movement - WMIC</option>
          </select>
          <div class="chosen-container chosen-container-multi" title="" id="threat_contexts_chosen" style="width: 540px;">
            <ul class="chosen-choices">
              <li class="search-field">
                <input class="chosen-search-input default" type="text" autocomplete="off" value="Type here to find threat contexts" style="width: 225.016px;">
              </li>
            </ul>
            <div class="chosen-drop">
              <ul class="chosen-results"></ul>
            </div>
          </div>
        </div>
        <div class="form-group">
          <label>5. Select output format </label>
          <select class="form-control" name="output_format" id="output_format">
            <option value="cef">CEF</option>
            <option value="csv">CSV</option>
            <option value="json">JSON</option>
          </select>
        </div>
        <div class="text-right">
          <button class="cta-primary btn" id="button" type="submit">Generate</button>
        </div>
        <div id="overlay">
          <div class="cv-spinner">
            <span class="spinner"></span>
          </div>
        </div>
      </div>
    </div>
  </div>
</form>

Text Content

 * API
 * CONTACT

Generate *near real* logs to test your SIEM or create Usecases or Red Teaming
activities or for Labs
or to create Deep Learning dataset etc...
 
The online web version allows you to download upto 30,000 log lines. If you
require more and/or all,
then please request for an api key!

1. Select logging devices

Cisco ASA Cisco ISE Microsoft ATA Microsoft Windows Swift Alliance Access
 * 





2. Select date time range
3. Number of Log lines

You can generate from 10000 to 30,000 log lines
4. Introduce Threat Context

Command & Control RDP Command & Control RDP Tunneling Credential Access - ACL
Forcepwd Credential Access - Chrome Firefox Opera Credential Access - DC Sync
Credential Access - Hashdump lsass access Excessive Firewall Denies Lateral
Movement - Mimikatz Lateral Movement - Net Share Drive Lateral Movement - REMCOM
Lateral Movement - Renamed psexecsvc Lateral Movement - Scheduled Task ATSVC
Lateral Movement - Target Host Lateral Movement - WMIC
 * 


5. Select output format CEF CSV JSON
Generate

 * © MARIRS
 * PRIVACY POLICY
 * EULA

PRIVACY POLICY

×

This privacy policy applies between you, the user of this website and logs.to,
the owner and provider of this website. logs.to takes the privacy of your
information very seriously. this privacy policy applies to our use of any and
all data collected by us or provided by you in relation to your use of the
website.

*** please read this privacy policy carefully ***


DEFINITIONS AND INTERPRETATION

In this privacy policy, the following definitions are used

DATA

Collectively all information that you submit to logs.to via the website. this
definition incorporates, where applicable, the definitions provided in the data
protection laws;

DATA PROTECTION LAWS

Any applicable law relating to the processing of personal data, including but
not limited to the directive 96/46/ec (data protection directive) or the gdpr,
and any national implementing laws, regulations and secondary legislation, for
as long as the gdpr is effective in the uk;

GDPR

The general data protection regulation (eu) 2016/679;

LOGS.TO, WE

logs.to, the company/website that has made this tool so users can generate log
datasets from various devices to test their SIEM's, create use-cases, use in
labs, etc...;

USER OR YOU

Any third party that accesses the website and is not either (i) employed by
sandbox.org and acting in the course of their employment or (ii) engaged as a
consultant or otherwise providing services to logs.to and accessing the website
in connection with the provision of such services; and

WEBSITE

The website that you are currently using, https://www.logs.to , and any
sub-domains of this site unless expressly excluded by their own terms and
conditions.

in this privacy policy, unless the context requires a different interpretation:

 1. the singular includes the plural and vice versa;
 2. references to sub-clauses, clauses, schedules or appendices are to
    sub-clauses, clauses, schedules or appendices of this privacy policy;
 3. a reference to a person includes firms, companies, government entities,
    trusts and partnerships;
 4. "including" is understood to mean "including without limitation";
 5. reference to any statutory provision includes any modification or amendment
    of it;
 6. the headings and sub-headings do not form part of this privacy policy.


SCOPE OF THIS PRIVACY POLICY

this privacy policy applies only to the actions of logs.to and users with
respect to this website. it does not extend to any websites that can be accessed
from this website including, but not limited to, any links we may provide to
social media websites.

for purposes of the applicable data protection laws, logs.to is the "data
controller". this means that logs.to determines the purposes for which, and the
manner in which, your data is processed.


DATA COLLECTED

this privacy policy applies only to the actions of logs.to and users with
respect to this website. it does not extend to any websites that can be accessed
from this website including, but not limited to, any links we may provide to
social media websites.

for purposes of the applicable data protection laws, logs.to is the "data
controller". this means that logs.to determines the purposes for which, and the
manner in which, your data is processed.


DATA COLLECTED

we may collect the following data, which includes personal data, from you:

 1. name;
 2. contact information such as email addresses and telephone numbers;
 3. ip address (automatically collected);
 4. web browser type and version (automatically collected);
    in each case, in accordance with this privacy policy.


HOW WE COLLECT DATA

we collect data in the following ways:

 1. data is given to us by you; and
 2. data is collected automatically.


DATA THAT IS GIVEN TO US BY YOU

logs.to will collect your data in a number of ways, for example:

 1. when you contact us through the website, by telephone, post, e-mail or
    through any other means;
 2. when you register with us and set up an account to receive our
    products/services;
 3. when you use our services;
    in each case, in accordance with this privacy policy.


DATA THAT IS COLLECTED AUTOMATICALLY

to the extent that you access the website, we will collect your data
automatically, for example:

 1. we automatically collect some information about your visit to the website.
    this information helps us to make improvements to website content and
    navigation, and includes your ip address, the date, times and frequency with
    which you access the website and the way you use and interact with its
    content.


OUR USE OF DATA

any or all of the above data may be required by us from time to time in order to
provide you with the best possible service and experience when using our
website. specifically, data may be used by us for the following reasons:

 1. improvement of our products / services;
    in each case, in accordance with this privacy policy.

we may use your data for the above purposes if we deem it necessary to do so for
our legitimate interests. if you are not satisfied with this, you have the right
to object in certain circumstances (see the section headed "your rights" below).

when you register with us and set up an account to receive our services, the
legal basis for this processing is the performance of a contract between you and
us and/or taking steps, at your request, to enter into such a contract.


KEEPING DATA SECURE

we will use technical and organisational measures to safeguard your data, for
example:

 1. access to your account is controlled by a password and a user name that is
    unique to you and known only to you.
 2. we store your data on secure servers.

technical and organisational measures include measures to deal with any
suspected data breach. if you suspect any misuse or loss or unauthorised access
to your data, please let us know immediately by contacting us via this e-mail
address: abuse@logs.to.

if you want detailed information from get safe online on how to protect your
information and your computers and devices against fraud, identity theft,
viruses and many other online problems, please visit www.getsafeonline.org. get
safe online is supported by hm government and leading businesses.


DATA RETENTION

unless a longer retention period is required or permitted by law, we will only
hold your data on our systems for the period necessary to fulfil the purposes
outlined in this privacy policy or until you request that the data be deleted.

even if we delete your data, it may persist on backup or archival media for
legal, tax or regulatory purposes.


YOU HAVE THE FOLLOWING RIGHTS IN RELATION TO YOUR DATA:

 1. right to access - he right to request (i) copies of the information we hold
    about you at any time, or (ii) that we modify, update or delete such
    information. if we provide you with access to the information we hold about
    you, we will not charge you for this, unless your request is "manifestly
    unfounded or excessive." where we are legally permitted to do so, we may
    refuse your request. if we refuse your request, we will tell you the reasons
    why.
 2. right to correct - the right to have your data rectified if it is inaccurate
    or incomplete.
 3. right to erase - the right to request that we delete or remove your data
    from our systems.
 4. right to restrict our use of your data - the right to "block" us from using
    your data or limit the way in which we can use it.
 5. right to data portability - the right to request that we move, copy or
    transfer your data.
 6. right to object - the right to object to our use of your data including
    where we use it for our legitimate interests.

to make enquiries, exercise any of your rights set out above, or withdraw your
consent to the processing of your data (where consent is our legal basis for
processing your data), please contact us via this e-mail address:
abuse@logs.to/p>

if you are not satisfied with the way a complaint you make in relation to your
data is handled by us, you may be able to refer your complaint to the relevant
data protection authority. for the uk, this is the information commissioner's
office (ico). the ico's contact details can be found on their website at
https://ico.org.uk/.

it is important that the data we hold about you is accurate and current. please
keep us informed if your data changes during the period for which we hold it.


TRANSFERS OUTSIDE THE EUROPEAN ECONOMIC AREA

data which we collect from you may be stored and processed in and transferred to
countries outside of the european economic area (eea). for example, this could
occur if our servers are located in a country outside the eea or one of our
service providers is situated in a country outside the eea. we also share
information with our group companies, some of which are located outside the eea.

we will only transfer data outside the eea where it is compliant with data
protection legislation and the means of transfer provides adequate safeguards in
relation to your data, eg by way of data transfer agreement, incorporating the
current standard contractual clauses adopted by the european commission, or by
signing up to the eu-us privacy shield framework, in the event that the
organisation in receipt of the data is based in the united states of america.

to ensure that your data receives an adequate level of protection, we have put
in place appropriate safeguards and procedures with the third parties we share
your data with. this ensures your data is treated by those third parties in a
way that is consistent with the data protection laws.


LINKS TO OTHER WEBSITES

this website may, from time to time, provide links to other websites. we have no
control over such websites and are not responsible for the content of these
websites. this privacy policy does not extend to your use of such websites. you
are advised to read the privacy policy or statement of other websites prior to
using them.


CHANGES OF BUSINESS OWNERSHIP AND CONTROL

logs.to may, from time to time, expand or reduce our business and this may
involve the sale and/or the transfer of control of all or part of logs.to. data
provided by users will, where it is relevant to any part of our business so
transferred, be transferred along with that part and the new owner or newly
controlling party will, under the terms of this privacy policy, be permitted to
use the data for the purposes for which it was originally supplied to us.

we may also disclose data to a prospective purchaser of our business or any part
of it.

in the above instances, we will take steps with the aim of ensuring your privacy
is protected.


GENERAL

you may not transfer any of your rights under this privacy policy to any other
person. we may transfer our rights under this privacy policy where we reasonably
believe your rights will not be affected.

if any court or competent authority finds that any provision of this privacy
policy (or part of any provision) is invalid, illegal or unenforceable, that
provision or part-provision will, to the extent required, be deemed to be
deleted, and the validity and enforceability of the other provisions of this
privacy policy will not be affected.

unless otherwise agreed, no delay, act or omission by a party in exercising any
right or remedy will be deemed a waiver of that, or any other, right or remedy.


CHANGES TO THIS PRIVACY POLICY

logs.to reserves the right to change this privacy policy as we may deem
necessary from time to time or as may be required by law. any changes will be
immediately posted on the website and you are deemed to have accepted the terms
of the privacy policy from your first use of the website following the
alterations.

you may contact us by email at abuse@logs.to

Got it!

END USER LICENSE AGREEMENT (EULA)

×

This End-User License Agreement ("EULA") is a legal agreement between you and
LOGS.TO

This EULA agreement governs your acquisition and use of our logs generator web
application ("web application") directly from LOGS.TO or indirectly through a
LOGS.TO authorized reseller or distributor (a "Reseller").

Please read this EULA agreement carefully before completing the installation
process and using the logs generator web application. It provides a license to
use the logs generator web application and contains warranty information and
liability disclaimers.

If you register for a API Key of the logs generator web app, this EULA agreement
will also govern that API provision. By "accepting" or installing and/or using
the logs generator web application, you are confirming your acceptance of the
web application and agreeing to become bound by the terms of this EULA
agreement.

If you are entering into this EULA agreement on behalf of a company or other
legal entity, you represent that you have the authority to bind such entity and
its affiliates to these terms and conditions. If you do not have such authority
or if you do not agree with the terms and conditions of this EULA agreement, do
not install or use the web application, and you must not accept this EULA
agreement.

This EULA agreement shall apply only to the web application supplied by LOGS.TO
herewith regardless of whether other web application is referred to or described
herein. The terms also apply to any LOGS.TO updates, supplements, Internet-based
services, and support services for the web application, unless other terms
accompany those items on delivery. If so, those terms apply.


LICENSE GRANT

LOGS.TO hereby grants you a personal, non-transferable, non-exclusive licence to
use the logs generator web application on your devices in accordance with the
terms of this EULA agreement.

You are permitted to use the logs generator web application under your control.
You are responsible for ensuring your device meets the minimum requirements of
the logs generator web application.

You are not permitted to:

 * Edit, alter, modify, adapt, translate or otherwise change the whole or any
   part of the web application nor permit the whole or any part of the web
   application and the generated logs/contents to be combined with or become
   incorporated in any other web application, nor decompile, disassemble or
   reverse engineer the web application and the generated logs/contents or
   attempt to do any such things
 * Reproduce, copy, distribute, resell or otherwise use the web application and
   the generated logs/contents for any commercial purpose
 * Allow any third party to use the web application and the generated
   logs/contents on behalf of or for the benefit of any third party
 * Use the web application and the generated logs/contents in any way which
   breaches any applicable local, national or international law
 * use the web application and the generated logs/contents for any purpose that
   LOGS.TO considers is a breach of this EULA agreement


INTELLECTUAL PROPERTY AND OWNERSHIP

LOGS.TO shall at all times retain ownership of the web application and the
generated logs/contents as originally downloaded by you and all subsequent
downloads of the generated logs/contents by you. The web application (and the
copyright, and other intellectual property rights of whatever nature in the web
application, including any modifications made thereto) are and shall remain the
property of LOGS.TO.

LOGS.TO reserves the right to grant licences to use the web application to third
parties.


TERMINATION

This EULA agreement is effective from the date you first use the web application
and shall continue until terminated. You may terminate it at any time upon you
stop coming to the website and using it.

It will also terminate immediately if you fail to comply with any term of this
EULA agreement. Upon such termination, the licenses granted by this EULA
agreement will immediately terminate and you agree to stop all access and use of
the web application. The provisions that by their nature continue and survive
will survive any termination of this EULA agreement.


GOVERNING LAW

This EULA agreement, and any dispute arising out of or in connection with this
EULA agreement, shall be governed by and construed in accordance with the laws
of in.

Got it!
 * Today
 * Yesterday
 * Last 7 Days
 * Last 30 Days
 * This Month
 * Last Month
 * Custom Range



CancelApply