All Projects → Network Intrusion Detection → Similar Projects or Alternatives

425 Open source projects that are alternatives of or similar to Network Intrusion Detection

Nfstream
NFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+105.28%)
Mutual labels:  cybersecurity, network-security
SuperLibrary
Information Security Library
Stars: ✭ 60 (-80.2%)
Mutual labels:  cybersecurity, network-security
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-87.46%)
Mutual labels:  cybersecurity, network-security
Violent Python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 603 (+99.01%)
Mutual labels:  cybersecurity, network-security
Blackhat Python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+271.29%)
Mutual labels:  cybersecurity, network-security
PoW-Shield
Project dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (-67.33%)
Mutual labels:  cybersecurity, network-security
domfind
A Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (-92.74%)
Mutual labels:  cybersecurity
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-84.16%)
Mutual labels:  cybersecurity
CyberICS.github.io
News and publication on cybersecurity in industry
Stars: ✭ 29 (-90.43%)
Mutual labels:  cybersecurity
network-pipeline
Network traffic data pipeline for real-time predictions and building datasets for deep neural networks
Stars: ✭ 36 (-88.12%)
Mutual labels:  network-security
Fpnd
Python package for freepn network daemon
Stars: ✭ 271 (-10.56%)
Mutual labels:  network-security
aeacus
🔐 Vulnerability remediation scoring system
Stars: ✭ 52 (-82.84%)
Mutual labels:  cybersecurity
dorothy
Dorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (-71.95%)
Mutual labels:  cybersecurity
ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (-14.85%)
Mutual labels:  cybersecurity
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-79.87%)
Mutual labels:  cybersecurity
RecoverPy
🙈 Interactively find and recover deleted or 👉 overwritten 👈 files from your terminal
Stars: ✭ 189 (-37.62%)
Mutual labels:  cybersecurity
Security Onion
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+875.58%)
Mutual labels:  intrusion-detection
Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-88.78%)
Mutual labels:  cybersecurity
pycommunityid
A Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (-94.06%)
Mutual labels:  network-security
CTF-Write-UP
澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (-91.09%)
Mutual labels:  cybersecurity
Attack Scripts
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Stars: ✭ 290 (-4.29%)
Mutual labels:  cybersecurity
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-76.9%)
Mutual labels:  cybersecurity
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+77.56%)
Mutual labels:  cybersecurity
suspicious login
Detect and warn about suspicious IPs logging into Nextcloud
Stars: ✭ 45 (-85.15%)
Mutual labels:  intrusion-detection
phomber
Phomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-80.53%)
Mutual labels:  cybersecurity
Hack-Utils
Script to facilitate different functions and checks
Stars: ✭ 27 (-91.09%)
Mutual labels:  network-security
pyHIDS
A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Stars: ✭ 31 (-89.77%)
Mutual labels:  intrusion-detection
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-71.95%)
Mutual labels:  cybersecurity
Libellux-Up-and-Running
Libellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-93.73%)
Mutual labels:  intrusion-detection
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-69.97%)
Mutual labels:  cybersecurity
gonids
gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (-53.8%)
Mutual labels:  network-security
Cyberscan
CyberScan: Network's Forensics ToolKit
Stars: ✭ 280 (-7.59%)
Mutual labels:  network-security
penetration testing
🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-81.19%)
Mutual labels:  network-security
FakeUSB
Make your own BadUSB device!
Stars: ✭ 14 (-95.38%)
Mutual labels:  cybersecurity
idsa
This is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
Stars: ✭ 22 (-92.74%)
Mutual labels:  cybersecurity
Chepy
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
Stars: ✭ 295 (-2.64%)
Mutual labels:  cybersecurity
awesome-security-feed
A semi-curated list of Security Feeds
Stars: ✭ 64 (-78.88%)
Mutual labels:  cybersecurity
wifi-deauther
A fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-91.75%)
Mutual labels:  cybersecurity
security-guidance
Security guidance from the MOJ Digital & Technology Cybersecurity team
Stars: ✭ 14 (-95.38%)
Mutual labels:  cybersecurity
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-10.23%)
Mutual labels:  cybersecurity
rstthreats
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-94.39%)
Mutual labels:  cybersecurity
bsmtrace
BSM based intrusion detection system
Stars: ✭ 31 (-89.77%)
Mutual labels:  intrusion-detection
goblin
一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+178.55%)
Mutual labels:  cybersecurity
Psad
psad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (-1.65%)
Mutual labels:  intrusion-detection
Malware-Machine-Learning
Malware Machine Learning
Stars: ✭ 26 (-91.42%)
Mutual labels:  cybersecurity
WiFi-Project
Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-92.74%)
Mutual labels:  cybersecurity
AwesomeMoroccanHackers
An Awesome List of Moroccan Cyber Security Researchers, Pentesters, Bug Hunters.
Stars: ✭ 69 (-77.23%)
Mutual labels:  cybersecurity
Expose
An Intrusion Detection System library loosely based on PHP IDS
Stars: ✭ 255 (-15.84%)
Mutual labels:  intrusion-detection
Cyber-Security
This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (-86.14%)
Mutual labels:  cybersecurity
vagrant-ids
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-93.07%)
Mutual labels:  intrusion-detection
Subzy
Subdomain takeover vulnerability checker
Stars: ✭ 287 (-5.28%)
Mutual labels:  cybersecurity
attckr
⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-92.74%)
Mutual labels:  cybersecurity
what-vpn
Identify servers running various SSL VPNs based on protocol-specific behaviors
Stars: ✭ 24 (-92.08%)
Mutual labels:  network-security
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (-54.46%)
Mutual labels:  cybersecurity
NIDS-Intrusion-Detection
Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-85.15%)
Mutual labels:  intrusion-detection
OpenVAS-Docker
A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-94.72%)
Mutual labels:  cybersecurity
avain
A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (-81.52%)
Mutual labels:  network-security
Behold3r
👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Stars: ✭ 29 (-90.43%)
Mutual labels:  cybersecurity
pdns-qof
Passive DNS Common Output Format
Stars: ✭ 30 (-90.1%)
Mutual labels:  network-security
CTF-Writeups
Repository of my CTF writeups
Stars: ✭ 25 (-91.75%)
Mutual labels:  cybersecurity
1-60 of 425 similar projects