HashidsA small PHP library to generate YouTube-like ids from numbers. Use it when you don't want to expose your database ids to the user.
Stars: ✭ 4,596 (+599.54%)
Suricata RulesSuricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等
Stars: ✭ 397 (-39.57%)
SigmaGeneric Signature Format for SIEM Systems
Stars: ✭ 4,418 (+572.45%)
Hashids.jsA small JavaScript library to generate YouTube-like ids from numbers.
Stars: ✭ 3,525 (+436.53%)
EveboxWeb Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search
Stars: ✭ 286 (-56.47%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+349.92%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (-95.28%)
gonidsgonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (-78.69%)
Remote-Integrity-ToolThe DearBytes remote integrity tool is an IDS (Intrusion Detection System) that keeps track of files on a remote server and logs an event if a file gets added, removed or modified.
Stars: ✭ 12 (-98.17%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-93.15%)
graylog-zeek-content-packBRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to capture and index BRO/Zeek logs coming from a remote sensor.
Stars: ✭ 18 (-97.26%)
ids高效的分布式id生成器,每个客户端实例tps可达到100万,服务端毫无压力。即使服务端宕机了,id生成依然可用。支持多数据中心,支持id加密。
Stars: ✭ 47 (-92.85%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-96.8%)
ProbeManagerCentralize Management of Intrusion Detection System like Suricata Bro Ossec ...
Stars: ✭ 73 (-88.89%)
harshHashids implementation in Rust
Stars: ✭ 48 (-92.69%)
FragscapyFragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multiple successive tests to determine which options can be used to evade firewalls and IDS.
Stars: ✭ 52 (-92.09%)
IPRadar2Real-time detection and defense against malicious network activity and policy violations (exploits, port-scanners, advertising, telemetry, state surveillance, etc.)
Stars: ✭ 20 (-96.96%)
eewidsEasily Expandable Wireless Intrusion Detection System
Stars: ✭ 25 (-96.19%)
moleYara powered NIDS with high speed packet capture powered by PF_RING
Stars: ✭ 51 (-92.24%)
ScanrDetect x86 shellcode in files and traffic.
Stars: ✭ 16 (-97.56%)
youtube-playlist❄️ Extract links, ids, and names from a youtube playlist
Stars: ✭ 73 (-88.89%)
TNSR IDSIDS using a port mirror, Snort and an alert -> RESTCONF utility
Stars: ✭ 30 (-95.43%)
ML-IDSAn IDS implementation using machine learning
Stars: ✭ 30 (-95.43%)
wazuh-packagesWazuh - Tools for packages creation
Stars: ✭ 54 (-91.78%)
shortidSuper short, fully unique, non-sequential and URL-friendly Ids
Stars: ✭ 20 (-96.96%)
hashids.pmHashids, ported for Perl
Stars: ✭ 15 (-97.72%)
firewall-controllerA kubernetes controller running on bare-metal firewalls, creating nftables rules, configures suricata, collects network metrics
Stars: ✭ 37 (-94.37%)
UTMFWUTM Firewall on OpenBSD
Stars: ✭ 104 (-84.17%)
prickly-peteA script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
Stars: ✭ 29 (-95.59%)
Sagan** README ** This repo has MOVED to https://github.com/quadrantsec/sagan
Stars: ✭ 236 (-64.08%)
Wazuh DockerWazuh - Docker containers
Stars: ✭ 213 (-67.58%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (-68.19%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (-68.8%)
WhidsOpen Source EDR for Windows
Stars: ✭ 188 (-71.39%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+380.06%)
SuricataSuricata git repository maintained by the OISF
Stars: ✭ 2,274 (+246.12%)
Suricata UpdateThe tool for updating your Suricata rules.
Stars: ✭ 143 (-78.23%)
Threatbus🚌 The missing link to connect open-source threat intelligence tools.
Stars: ✭ 139 (-78.84%)
Snort RulesAn UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (-79.45%)
Docker BroBro IDS Dockerfile
Stars: ✭ 126 (-80.82%)
Particle64 bit ID Generator
Stars: ✭ 125 (-80.97%)
Uuid RandomFastest UUID with cryptographic PRNG for JS
Stars: ✭ 87 (-86.76%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+89.95%)
Optimus🤖 Id obfuscation based on Knuth's multiplicative hashing method for PHP.
Stars: ✭ 1,084 (+64.99%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-98.63%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+21.16%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+916.29%)
SelksA Suricata based IDS/IPS distro
Stars: ✭ 707 (+7.61%)