vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-12.5%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (+87.5%)
sandfly-setupSandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (+87.5%)
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+2925%)
Gru Svm[ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection
Stars: ✭ 76 (+216.67%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (+770.83%)
netcheckA shell script to check and log when your internet connection goes down.
Stars: ✭ 138 (+475%)
Agentsmith HidsBy Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.
Stars: ✭ 513 (+2037.5%)
ExposeAn Intrusion Detection System library loosely based on PHP IDS
Stars: ✭ 255 (+962.5%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+5100%)
Tr1pdtamper resistant audit log
Stars: ✭ 13 (-45.83%)
connection checkerAndroid library for checking the internet connectivity of a device.
Stars: ✭ 26 (+8.33%)
MidasAnomaly Detection on Dynamic (time-evolving) Graphs in Real-time and Streaming manner. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 591 (+2362.5%)
BriaridsAn All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.
Stars: ✭ 187 (+679.17%)
Ossec HidsOSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Stars: ✭ 3,580 (+14816.67%)
flask-ocruse flask and tesseract to have a basic ocr, also you need opencv2, this code use opencv2 to have a basic image process
Stars: ✭ 27 (+12.5%)
Psadpsad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (+1141.67%)
Snort RulesAn UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (+462.5%)
GetJSONGetJson is the simplest HTTP library to Receive JSON Data from REST Service.
Stars: ✭ 18 (-25%)
pyHIDSA HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Stars: ✭ 31 (+29.17%)
NfrA lightweight tool to score network traffic and flag anomalies
Stars: ✭ 104 (+333.33%)
suspicious loginDetect and warn about suspicious IPs logging into Nextcloud
Stars: ✭ 45 (+87.5%)
SiacSIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (+316.67%)
WeakforcedAnti-Abuse for servers at authentication time
Stars: ✭ 84 (+250%)
SecumlMachine Learning for Computer Security
Stars: ✭ 221 (+820.83%)
cross connectivityA Flutter plugin for handling Connectivity and REAL Connection state in the mobile, web and desktop platforms. Supports iOS, Android, Web, Windows, Linux and macOS.
Stars: ✭ 27 (+12.5%)
Osql ExperimentalA community-oriented fork of osquery with support for cmake, public CI testing, and regular releases
Stars: ✭ 62 (+158.33%)
Wazuh DockerWazuh - Docker containers
Stars: ✭ 213 (+787.5%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-62.5%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+27720.83%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (+754.17%)
FlightsimA utility to generate malicious network traffic and evaluate controls
Stars: ✭ 525 (+2087.5%)
network-smoothieDead simple internet bonding. Take advantege of multiple network adapters.
Stars: ✭ 14 (-41.67%)
MaltrailMalicious traffic detection system
Stars: ✭ 4,296 (+17800%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+13041.67%)
OsquerySQL powered operating system instrumentation, monitoring, and analytics.
Stars: ✭ 18,475 (+76879.17%)
Yulong Hids一款由 YSRC 开源的主机入侵检测系统
Stars: ✭ 1,938 (+7975%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+12216.67%)
NetworkX🅽🅴🆃🆆🅾🆁🅺🆇 An easy & handy library to monitor device internet connection status.
Stars: ✭ 92 (+283.33%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (+29.17%)
Libellux-Up-and-RunningLibellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-20.83%)
ReactivenetworkAndroid library listening network connection state and Internet connectivity with RxJava Observables
Stars: ✭ 2,484 (+10250%)
BlackbookBlackbook of malware domains
Stars: ✭ 89 (+270.83%)
MStreamAnomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 68 (+183.33%)
BindToInterfaceWith this program you can bind applications to a specific network interface / network adapter. This is very useful if you have multiple (internet) connections and want your program to use a specific one.
Stars: ✭ 67 (+179.17%)
kdd99-scikitSolutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
Stars: ✭ 50 (+108.33%)
PysadStreaming Anomaly Detection Framework in Python (Outlier Detection for Streaming Data)
Stars: ✭ 87 (+262.5%)
LID-DSLID-DS is an intrusion detection data simulation framework.
Stars: ✭ 32 (+33.33%)
visualize-voc-format-dataA simple utility programe to visualize pascal voc (format) dataset images with bounding boxes. Useful to check whether there is any error in forming annotation files.
Stars: ✭ 23 (-4.17%)
Connectivity🌐 Makes Internet connectivity detection more robust by detecting Wi-Fi networks without Internet access.
Stars: ✭ 1,476 (+6050%)