All Projects → J4FSec → In0ri

J4FSec / In0ri

Licence: AGPL-3.0 License
Defacement detection with deep learning

Programming Languages

CSS
56736 projects
HTML
75241 projects
python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to In0ri

Pro-GNN
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Stars: ✭ 202 (+477.14%)
Mutual labels:  defense
gamechanger
GAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
Stars: ✭ 27 (-22.86%)
Mutual labels:  defense
FeatureScatter
Feature Scattering Adversarial Training
Stars: ✭ 64 (+82.86%)
Mutual labels:  defense
phpwaf-phanalyzer
AliGuard PHP WAF
Stars: ✭ 12 (-65.71%)
Mutual labels:  defense
cloudrasp-log4j2
一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
Stars: ✭ 105 (+200%)
Mutual labels:  defense
TIGER
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (+194.29%)
Mutual labels:  defense
sqlscan
Quick SQL Scanner, Dorker, Webshell injector PHP
Stars: ✭ 140 (+300%)
Mutual labels:  defacement
black-hat-python3-code
🏴‍☠️ tools (py3 version) of Black Hat Python book 🏴‍☠️
Stars: ✭ 51 (+45.71%)
Mutual labels:  blackhat
MSF-Self-Defence
Self defense post module for metasploit
Stars: ✭ 18 (-48.57%)
Mutual labels:  defense
bidscoin
BIDScoin converts your source-level neuroimaging data to BIDS
Stars: ✭ 75 (+114.29%)
Mutual labels:  deface
jpeg-defense
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (+134.29%)
Mutual labels:  defense
Portforge
Lightweight utility to fool port scanners
Stars: ✭ 23 (-34.29%)
Mutual labels:  defense
BTPS-SecPack
This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
Stars: ✭ 33 (-5.71%)
Mutual labels:  defense
SWELF
Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (-34.29%)
Mutual labels:  defense
structural-imbalance
Demo for analyzing the structural imbalance on a signed social network.
Stars: ✭ 22 (-37.14%)
Mutual labels:  defense
satellite-placement
Group satellites into constellations such that their average observation coverage is maximized
Stars: ✭ 20 (-42.86%)
Mutual labels:  defense
REW-sploit
Emulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+228.57%)
Mutual labels:  defense
gamechanger-data
GAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
Stars: ✭ 17 (-51.43%)
Mutual labels:  defense
shellsum
A defense tool - detect web shells in local directories via md5sum
Stars: ✭ 30 (-14.29%)
Mutual labels:  defense
csf
ArmourBird CSF - Container Security Framework
Stars: ✭ 48 (+37.14%)
Mutual labels:  blackhat

GitHub

In0ri is a defacement detection system utilizing a image-classification convolutional neural network.

Introduction

When monitoring a website, In0ri will periodically take a screenshot of the website then put it through a preprocessor that will resize the image down to 250x250px and numericalize the image before passing it onto the classifier. The core of the classifier is a convolutional neural network that is trained to detect the defacement of a website. If the monitored website is indeed, defaced, In0ri will send out warnings via email to the user.

Requirement

  • Python3 (version >=3.6)
  • Docker
  • Docker-compose

Installation

Cloning the repository

git clone https://github.com/J4FSec/In0ri.git
cd In0ri

Docker

You can also use In0ri via the official Docker container here.

Starting In0ri

docker-compose up -d

After running the In0ri, open an Internet browser to https://<serverIP>:8080/ to show WebUI.

Configuring email credentials to send notifications and agent keys from

Going to the WebUI and click tab "Setting" then select tag "Email" to configure email server.

Mail Server = "mail.example.com"
Username = "[email protected]"
Password = "$uper$ecurePa$$word"

Configure Telegram notification

Going to the WebUI and click tab "Setting" then select tag "Telegram" to configure Channel notifications on Telegram.

Chat ID= 'foo' # Channel ID to send notifications to
Token = 'bar' # Bot token retrieved from @BotFather

Usage

There are two ways to deploy and using In0ri:

  • Running off crontab by periodically visiting the url.
  • Internal agent running off the web server

First Method: URL Check

Visit the Dashboard tab on WebUI, click on "Add URLs" then fill in the form and submit it.

Second Method: Internal Agent

At the table listing all urls which were registered on WebUI, click on "Create Key" button at column Actions, the Active Key will send to your email or click "Details" button to show it.

On the web server that you wants to be monitored by In0ri, download the Agent folder from Github repository

Installing the required packages for the internal Agent

python3 -m pip install watchdog
python3 -m pip install requests

Edit the file config.json in the same folder as agent

nano config.json

A key is sent to your email after registering the Agent on the WebUI rootPath is the root directory of the web application that you want to be monitored exludePath are the subfolders that you wants excluded from the scans apiServer is the URL to the API server of In0ri serverIP is the IP of the API server of In0ri

{
    "id":"01",
    "key":"123123123",
    "rootPath":"/var/www/html",
    "excludePath":"",
    "apiServer":"http://<serverIP>:8088/checkdeface"
}

And run the Agent:

python3 agent.py

References

Authors

In0ri is built by Echidna with the help of Cu64 and Klone.

Contributing

Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.

License

GNU AGPLv3

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].