bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (-77.04%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (+54.81%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-66.67%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-84.44%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+2089.63%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+2236.3%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+4845.93%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+824.44%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-93.33%)
Wazuh DockerWazuh - Docker containers
Stars: ✭ 213 (+57.78%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (+51.85%)
OsquerySQL powered operating system instrumentation, monitoring, and analytics.
Stars: ✭ 18,475 (+13585.19%)
Tr1pdtamper resistant audit log
Stars: ✭ 13 (-90.37%)
Psadpsad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (+120.74%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+489.63%)
EveboxWeb Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search
Stars: ✭ 286 (+111.85%)
ExposeAn Intrusion Detection System library loosely based on PHP IDS
Stars: ✭ 255 (+88.89%)
pyHIDSA HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Stars: ✭ 31 (-77.04%)
Libellux-Up-and-RunningLibellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-85.93%)
gonidsgonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (+3.7%)
Ossec HidsOSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Stars: ✭ 3,580 (+2551.85%)
Optimus🤖 Id obfuscation based on Knuth's multiplicative hashing method for PHP.
Stars: ✭ 1,084 (+702.96%)
SiacSIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (-25.93%)
Remote-Integrity-ToolThe DearBytes remote integrity tool is an IDS (Intrusion Detection System) that keeps track of files on a remote server and logs an event if a file gets added, removed or modified.
Stars: ✭ 12 (-91.11%)
ShortidSuper short, fully unique, non-sequential and URL friendly Ids
Stars: ✭ 657 (+386.67%)
suspicious loginDetect and warn about suspicious IPs logging into Nextcloud
Stars: ✭ 45 (-66.67%)
Uuid RandomFastest UUID with cryptographic PRNG for JS
Stars: ✭ 87 (-35.56%)
Hashids.jsA small JavaScript library to generate YouTube-like ids from numbers.
Stars: ✭ 3,525 (+2511.11%)
NfrA lightweight tool to score network traffic and flag anomalies
Stars: ✭ 104 (-22.96%)
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+437.78%)
WeakforcedAnti-Abuse for servers at authentication time
Stars: ✭ 84 (-37.78%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-84.44%)
SelksA Suricata based IDS/IPS distro
Stars: ✭ 707 (+423.7%)
Particle64 bit ID Generator
Stars: ✭ 125 (-7.41%)
FlightsimA utility to generate malicious network traffic and evaluate controls
Stars: ✭ 525 (+288.89%)
MStreamAnomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 68 (-49.63%)
MidasAnomaly Detection on Dynamic (time-evolving) Graphs in Real-time and Streaming manner. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 591 (+337.78%)
Agentsmith HidsBy Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.
Stars: ✭ 513 (+280%)
graylog-zeek-content-packBRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to capture and index BRO/Zeek logs coming from a remote sensor.
Stars: ✭ 18 (-86.67%)
kdd99-scikitSolutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
Stars: ✭ 50 (-62.96%)
BlackbookBlackbook of malware domains
Stars: ✭ 89 (-34.07%)
Gru Svm[ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection
Stars: ✭ 76 (-43.7%)
HashidsA small PHP library to generate YouTube-like ids from numbers. Use it when you don't want to expose your database ids to the user.
Stars: ✭ 4,596 (+3304.44%)
ids高效的分布式id生成器,每个客户端实例tps可达到100万,服务端毫无压力。即使服务端宕机了,id生成依然可用。支持多数据中心,支持id加密。
Stars: ✭ 47 (-65.19%)
MaltrailMalicious traffic detection system
Stars: ✭ 4,296 (+3082.22%)
ProbeManagerCentralize Management of Intrusion Detection System like Suricata Bro Ossec ...
Stars: ✭ 73 (-45.93%)
harshHashids implementation in Rust
Stars: ✭ 48 (-64.44%)
Suricata RulesSuricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等
Stars: ✭ 397 (+194.07%)
FragscapyFragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multiple successive tests to determine which options can be used to evade firewalls and IDS.
Stars: ✭ 52 (-61.48%)