NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (+45.16%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (+574.19%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+3925.81%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+21438.71%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (+561.29%)
wazuh-packagesWazuh - Tools for packages creation
Stars: ✭ 54 (+74.19%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+10074.19%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+9435.48%)
Snort RulesAn UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (+335.48%)
Wazuh DockerWazuh - Docker containers
Stars: ✭ 213 (+587.1%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-70.97%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-32.26%)
ProbeManagerCentralize Management of Intrusion Detection System like Suricata Bro Ossec ...
Stars: ✭ 73 (+135.48%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-32.26%)
BitLocker-GuidanceConfiguration guidance for implementing BitLocker. #nsacyber
Stars: ✭ 90 (+190.32%)
FragscapyFragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multiple successive tests to determine which options can be used to evade firewalls and IDS.
Stars: ✭ 52 (+67.74%)
Audit-Test-AutomationThe Audit Test Automation Package gives you the ability to get an overview about the compliance status of several systems. You can easily create HTML-reports and have a transparent overview over compliance and non-compliance of explicit setttings and configurations in comparison to industry standards and hardening guides.
Stars: ✭ 37 (+19.35%)
IPRadar2Real-time detection and defense against malicious network activity and policy violations (exploits, port-scanners, advertising, telemetry, state surveillance, etc.)
Stars: ✭ 20 (-35.48%)
evaluatoryWeb page evaluation with a focus on accessibility
Stars: ✭ 57 (+83.87%)
pg-audit-jsonSimple, easily customised trigger-based auditing for PostgreSQL (Postgres). See also pgaudit.
Stars: ✭ 34 (+9.68%)
verdaccio-audit🛡🔬verdaccio plugin for npm audit support
Stars: ✭ 13 (-58.06%)
moleYara powered NIDS with high speed packet capture powered by PF_RING
Stars: ✭ 51 (+64.52%)
SIPTorchA "SIP Torture" (RFC 4475) testing suite.
Stars: ✭ 54 (+74.19%)
suspicious loginDetect and warn about suspicious IPs logging into Nextcloud
Stars: ✭ 45 (+45.16%)
eixampleMulti-Tenant .NET 6 Architecture (Angular, Vue, React)
Stars: ✭ 61 (+96.77%)
pg credereumPrototype of PostgreSQL extension bringing some properties of blockchain to the relational DBMS
Stars: ✭ 52 (+67.74%)
harshHashids implementation in Rust
Stars: ✭ 48 (+54.84%)
apache-baselineDevSec Apache Baseline - InSpec Profile
Stars: ✭ 37 (+19.35%)
DomainAccessibilityAuditWeb application to create domain and subdomain accessibility audits, with violation statistics.
Stars: ✭ 41 (+32.26%)
DolphinChainDolphinChain is the first Vulnerable Blockchain Application in the world!
Stars: ✭ 17 (-45.16%)
c4-common-issuesA collection of common security issues and possible gas optimizations in solidity smart contracts
Stars: ✭ 85 (+174.19%)
pyHIDSA HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Stars: ✭ 31 (+0%)
MStreamAnomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 68 (+119.35%)
site-audit-seoWeb service and CLI tool for SEO site audit: crawl site, lighthouse all pages, view public reports in browser. Also output to console, json, csv, xlsx, Google Drive.
Stars: ✭ 91 (+193.55%)
gonidsgonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (+351.61%)
eewidsEasily Expandable Wireless Intrusion Detection System
Stars: ✭ 25 (-19.35%)
nuxt-prune-html🔌⚡ Nuxt module to prune html before sending it to the browser (it removes elements matching CSS selector(s)), useful for boosting performance showing a different HTML for bots/audits by removing all the scripts with dynamic rendering
Stars: ✭ 69 (+122.58%)
UNSW NB15Feature coded UNSW_NB15 intrusion detection data.
Stars: ✭ 50 (+61.29%)
cis-dil-benchmarkCIS Distribution Independent Linux Benchmark - InSpec Profile
Stars: ✭ 120 (+287.1%)
wpaudit.siteAn easy to use checklist to optimize your WordPress website.
Stars: ✭ 24 (-22.58%)
srcinvsource code audit tool
Stars: ✭ 45 (+45.16%)
graylog-zeek-content-packBRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to capture and index BRO/Zeek logs coming from a remote sensor.
Stars: ✭ 18 (-41.94%)
ScanrDetect x86 shellcode in files and traffic.
Stars: ✭ 16 (-48.39%)
bitpricescommand-line tool that generates a report of transactions with the USD (fiat) value at the time of each transaction.
Stars: ✭ 17 (-45.16%)
pyenvdiff-libPython environment comparison tool
Stars: ✭ 23 (-25.81%)
freeauditPackaging audit toolkit using vulners.com vulnerability database
Stars: ✭ 19 (-38.71%)
Libellux-Up-and-RunningLibellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-38.71%)
Detect-CVE-2017-15361-TPMDetects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber
Stars: ✭ 34 (+9.68%)
kdd99-scikitSolutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
Stars: ✭ 50 (+61.29%)
youtube-playlist❄️ Extract links, ids, and names from a youtube playlist
Stars: ✭ 73 (+135.48%)