VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+51923.53%)
Mutual labels: security-vulnerability, security-scanner, security-automation
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (+123.53%)
Mutual labels: pcap, network-monitoring
network-toolsNetwork Tools
Stars: ✭ 27 (+58.82%)
Mutual labels: pcap, network-monitoring
ArkimeArkime (formerly Moloch) is an open source, large scale, full packet capturing, indexing, and database system.
Stars: ✭ 4,994 (+29276.47%)
Mutual labels: pcap, network-monitoring
sandfly-setupSandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (+164.71%)
Mutual labels: security-scanner, security-automation
Btle SnifferPassively scan for Bluetooth Low Energy devices and attempt to fingerprint them
Stars: ✭ 87 (+411.76%)
Mutual labels: security-vulnerability, security-scanner
ZeekZeek is a powerful network analysis framework that is much different from the typical IDS you may know.
Stars: ✭ 4,180 (+24488.24%)
Mutual labels: pcap, network-monitoring
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+4582.35%)
Mutual labels: security-vulnerability, security-scanner
PackagesThe default package source of the Zeek Package Manager
Stars: ✭ 94 (+452.94%)
Mutual labels: pcap, network-monitoring
PasserPassive service locator, a python sniffer that identifies servers, clients, names and much more
Stars: ✭ 144 (+747.06%)
Mutual labels: pcap, network-monitoring
vilicusVilicus is an open source tool that orchestrates security scans of container images(docker/oci) and centralizes all results into a database for further analysis and metrics.
Stars: ✭ 82 (+382.35%)
Mutual labels: security-vulnerability, security-scanner
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (+364.71%)
Mutual labels: security-vulnerability, security-automation
zeek-docsDocumentation for Zeek
Stars: ✭ 41 (+141.18%)
Mutual labels: pcap, network-monitoring
H1domainsHackerOne "in scope" domains
Stars: ✭ 223 (+1211.76%)
Mutual labels: security-vulnerability, security-automation
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+53647.06%)
Mutual labels: security-vulnerability, security-scanner
PoseidonPoseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict the type of device.
Stars: ✭ 310 (+1723.53%)
Mutual labels: pcap, network-monitoring
ekolabsEKOLABS esta dedicada para investigadores independientes y para la comunidad del Software Libre. Vamos a proveer de stands completos con monitor, alimentacion de energia y acceso a internet por cable, y vos vas a traer tu maquina para mostrar tu trabajo y responder preguntas de los participantes de Ekoparty Security Conference
Stars: ✭ 47 (+176.47%)
Mutual labels: security-vulnerability, scanning
SoteriaPlugin to block compilation when unapproved dependencies are used or code styling does not comply.
Stars: ✭ 36 (+111.76%)
Mutual labels: security-vulnerability, security-automation
NfstreamNFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+3558.82%)
Mutual labels: pcap, network-monitoring
VulnogramVulnogram is a tool for creating and editing CVE information in CVE JSON format
Stars: ✭ 103 (+505.88%)
Mutual labels: security-vulnerability, security-automation