TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-89.76%)
Snort RulesAn UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (-34.15%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+1438.54%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+508.78%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (+1.95%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+3157.07%)
Suricata RulesSuricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等
Stars: ✭ 397 (+93.66%)
Suricata UpdateThe tool for updating your Suricata rules.
Stars: ✭ 143 (-30.24%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+1341.95%)
NfrA lightweight tool to score network traffic and flag anomalies
Stars: ✭ 104 (-49.27%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-78.05%)
SelksA Suricata based IDS/IPS distro
Stars: ✭ 707 (+244.88%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (-84.88%)
BriaridsAn All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.
Stars: ✭ 187 (-8.78%)
EveboxWeb Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search
Stars: ✭ 286 (+39.51%)
wazuh-packagesWazuh - Tools for packages creation
Stars: ✭ 54 (-73.66%)
gonidsgonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (-31.71%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-89.76%)
feverfast, extensible, versatile event router for Suricata's EVE-JSON format
Stars: ✭ 47 (-77.07%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-95.61%)
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+254.15%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+288.29%)
SiacSIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (-51.22%)
Yulong Hids一款由 YSRC 开源的主机入侵检测系统
Stars: ✭ 1,938 (+845.37%)
Dynamite NsmDynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat detection
Stars: ✭ 92 (-55.12%)
BlackbookBlackbook of malware domains
Stars: ✭ 89 (-56.59%)
ShortidSuper short, fully unique, non-sequential and URL friendly Ids
Stars: ✭ 657 (+220.49%)
MidasAnomaly Detection on Dynamic (time-evolving) Graphs in Real-time and Streaming manner. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 591 (+188.29%)
FlightsimA utility to generate malicious network traffic and evaluate controls
Stars: ✭ 525 (+156.1%)
PysadStreaming Anomaly Detection Framework in Python (Outlier Detection for Streaming Data)
Stars: ✭ 87 (-57.56%)
Agentsmith HidsBy Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.
Stars: ✭ 513 (+150.24%)
HashidsA small PHP library to generate YouTube-like ids from numbers. Use it when you don't want to expose your database ids to the user.
Stars: ✭ 4,596 (+2141.95%)
Uuid RandomFastest UUID with cryptographic PRNG for JS
Stars: ✭ 87 (-57.56%)
SciriusScirius is a web application for Suricata ruleset management.
Stars: ✭ 435 (+112.2%)
Threatbus🚌 The missing link to connect open-source threat intelligence tools.
Stars: ✭ 139 (-32.2%)
MaltrailMalicious traffic detection system
Stars: ✭ 4,296 (+1995.61%)
WeakforcedAnti-Abuse for servers at authentication time
Stars: ✭ 84 (-59.02%)
SigmaGeneric Signature Format for SIEM Systems
Stars: ✭ 4,418 (+2055.12%)
PulledporkPulled Pork for Snort and Suricata rule management (from Google code)
Stars: ✭ 339 (+65.37%)
Ossec HidsOSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Stars: ✭ 3,580 (+1646.34%)
QnsmQNSM is network security monitoring framework based on DPDK.
Stars: ✭ 334 (+62.93%)
OsquerySQL powered operating system instrumentation, monitoring, and analytics.
Stars: ✭ 18,475 (+8912.2%)
Docker BroBro IDS Dockerfile
Stars: ✭ 126 (-38.54%)
Gru Svm[ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection
Stars: ✭ 76 (-62.93%)
Hashids.jsA small JavaScript library to generate YouTube-like ids from numbers.
Stars: ✭ 3,525 (+1619.51%)
Psadpsad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (+45.37%)
Particle64 bit ID Generator
Stars: ✭ 125 (-39.02%)
Osql ExperimentalA community-oriented fork of osquery with support for cmake, public CI testing, and regular releases
Stars: ✭ 62 (-69.76%)