All Projects → Network Intrusion Detection → Similar Projects or Alternatives

425 Open source projects that are alternatives of or similar to Network Intrusion Detection

Libellux-Up-and-Running
Libellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-93.73%)
Mutual labels:  intrusion-detection
cyberops
Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (-94.06%)
Mutual labels:  cybersecurity
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-69.97%)
Mutual labels:  cybersecurity
tariq
Hybrid Port Knocking System
Stars: ✭ 20 (-93.4%)
Mutual labels:  network-security
gonids
gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (-53.8%)
Mutual labels:  network-security
kdd99-scikit
Solutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
Stars: ✭ 50 (-83.5%)
Mutual labels:  intrusion-detection
Cyberscan
CyberScan: Network's Forensics ToolKit
Stars: ✭ 280 (-7.59%)
Mutual labels:  network-security
aurora
Malware similarity platform with modularity in mind.
Stars: ✭ 70 (-76.9%)
Mutual labels:  cybersecurity
penetration testing
🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-81.19%)
Mutual labels:  network-security
hackipy
Hacking, pen-testing, and cyber-security related tools built with Python.
Stars: ✭ 26 (-91.42%)
Mutual labels:  cybersecurity
FakeUSB
Make your own BadUSB device!
Stars: ✭ 14 (-95.38%)
Mutual labels:  cybersecurity
aflnw
AFLNW: network wrapper for AFL
Stars: ✭ 21 (-93.07%)
Mutual labels:  network-security
idsa
This is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
Stars: ✭ 22 (-92.74%)
Mutual labels:  cybersecurity
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (-4.95%)
Mutual labels:  cybersecurity
Chepy
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
Stars: ✭ 295 (-2.64%)
Mutual labels:  cybersecurity
TheBriarPatch
An extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-93.07%)
Mutual labels:  intrusion-detection
awesome-security-feed
A semi-curated list of Security Feeds
Stars: ✭ 64 (-78.88%)
Mutual labels:  cybersecurity
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (-76.9%)
Mutual labels:  cybersecurity
wifi-deauther
A fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-91.75%)
Mutual labels:  cybersecurity
client-python
OpenCTI Python Client
Stars: ✭ 45 (-85.15%)
Mutual labels:  cybersecurity
security-guidance
Security guidance from the MOJ Digital & Technology Cybersecurity team
Stars: ✭ 14 (-95.38%)
Mutual labels:  cybersecurity
SentryPeer
A distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (-64.36%)
Mutual labels:  cybersecurity
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-10.23%)
Mutual labels:  cybersecurity
firecracker
Stop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+44.55%)
Mutual labels:  cybersecurity
rstthreats
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-94.39%)
Mutual labels:  cybersecurity
sike-java
SIKE for Java is a software library that implements experimental supersingular isogeny cryptographic schemes that aim to provide protection against attackers running a large-scale quantum computer.
Stars: ✭ 28 (-90.76%)
Mutual labels:  cybersecurity
bsmtrace
BSM based intrusion detection system
Stars: ✭ 31 (-89.77%)
Mutual labels:  intrusion-detection
goblin
一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+178.55%)
Mutual labels:  cybersecurity
gsvsoc cirt-playbook-battle-cards
Cyber Incident Response Team Playbook Battle Cards
Stars: ✭ 142 (-53.14%)
Mutual labels:  cybersecurity
Psad
psad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (-1.65%)
Mutual labels:  intrusion-detection
network-tools
Network Tools
Stars: ✭ 27 (-91.09%)
Mutual labels:  network-security
Malware-Machine-Learning
Malware Machine Learning
Stars: ✭ 26 (-91.42%)
Mutual labels:  cybersecurity
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-71.29%)
Mutual labels:  cybersecurity
WiFi-Project
Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-92.74%)
Mutual labels:  cybersecurity
RedBook
基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (-81.52%)
Mutual labels:  cybersecurity
AwesomeMoroccanHackers
An Awesome List of Moroccan Cyber Security Researchers, Pentesters, Bug Hunters.
Stars: ✭ 69 (-77.23%)
Mutual labels:  cybersecurity
SCANNER-INURLBR
Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (-70.3%)
Mutual labels:  cybersecurity
Expose
An Intrusion Detection System library loosely based on PHP IDS
Stars: ✭ 255 (-15.84%)
Mutual labels:  intrusion-detection
EventTranscriptParser
Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-92.74%)
Mutual labels:  cybersecurity
Cyber-Security
This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (-86.14%)
Mutual labels:  cybersecurity
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+2287.46%)
Mutual labels:  cybersecurity
humble
A humble, and fast, security-oriented HTTP headers analyzer
Stars: ✭ 17 (-94.39%)
Mutual labels:  cybersecurity
vagrant-ids
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-93.07%)
Mutual labels:  intrusion-detection
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-85.15%)
Mutual labels:  cybersecurity
Subzy
Subdomain takeover vulnerability checker
Stars: ✭ 287 (-5.28%)
Mutual labels:  cybersecurity
digital-copyright
Stamp your code with a trackable digital copyright
Stars: ✭ 17 (-94.39%)
Mutual labels:  cybersecurity
attckr
⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-92.74%)
Mutual labels:  cybersecurity
testmynids.org
A website and framework for testing NIDS detection
Stars: ✭ 55 (-81.85%)
Mutual labels:  network-security
what-vpn
Identify servers running various SSL VPNs based on protocol-specific behaviors
Stars: ✭ 24 (-92.08%)
Mutual labels:  network-security
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-5.28%)
Mutual labels:  cybersecurity
NIDS-Intrusion-Detection
Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-85.15%)
Mutual labels:  intrusion-detection
ad-privileged-audit
Provides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-86.14%)
Mutual labels:  cybersecurity
OpenVAS-Docker
A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-94.72%)
Mutual labels:  cybersecurity
adv-dnn-ens-malware
adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (-89.11%)
Mutual labels:  cybersecurity
CTF-Writeups
Repository of my CTF writeups
Stars: ✭ 25 (-91.75%)
Mutual labels:  cybersecurity
Kali-Linux-Tools-Interface
Graphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (-44.22%)
Mutual labels:  cybersecurity
connectors
OpenCTI connectors
Stars: ✭ 135 (-55.45%)
Mutual labels:  cybersecurity
pdns-qof
Passive DNS Common Output Format
Stars: ✭ 30 (-90.1%)
Mutual labels:  network-security
Ccat
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (-0.99%)
Mutual labels:  cybersecurity
Adversary emulation library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (-2.64%)
Mutual labels:  cybersecurity
61-120 of 425 similar projects