BlackbookBlackbook of malware domains
Stars: ✭ 89 (+97.78%)
Tr1pdtamper resistant audit log
Stars: ✭ 13 (-71.11%)
viewer🖼 Simple file viewer with slideshow for media
Stars: ✭ 68 (+51.11%)
Snort RulesAn UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (+200%)
Ossec HidsOSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Stars: ✭ 3,580 (+7855.56%)
picosnitchMonitor network traffic per executable using BPF
Stars: ✭ 422 (+837.78%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+2673.33%)
MidasAnomaly Detection on Dynamic (time-evolving) Graphs in Real-time and Streaming manner. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 591 (+1213.33%)
Psadpsad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (+562.22%)
NetLearnerDeep Learning Tool for Off-line Network Intrusion Detection System
Stars: ✭ 24 (-46.67%)
NfrA lightweight tool to score network traffic and flag anomalies
Stars: ✭ 104 (+131.11%)
UNSW NB15Feature coded UNSW_NB15 intrusion detection data.
Stars: ✭ 50 (+11.11%)
Intrusion DetectionWhenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.
Stars: ✭ 24 (-46.67%)
Gru Svm[ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection
Stars: ✭ 76 (+68.89%)
kdd99-scikitSolutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
Stars: ✭ 50 (+11.11%)
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+1513.33%)
Agentsmith HidsBy Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.
Stars: ✭ 513 (+1040%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (+364.44%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+6908.89%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+6468.89%)
ocrNextcloud OCR (optical character recoginition) processing for images with tesseract-js
Stars: ✭ 98 (+117.78%)
Yulong Hids一款由 YSRC 开源的主机入侵检测系统
Stars: ✭ 1,938 (+4206.67%)
ldapcontactsView other LDAP users as contacts in Nextcloud and see the personal data they shared
Stars: ✭ 18 (-60%)
SiacSIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (+122.22%)
PysadStreaming Anomaly Detection Framework in Python (Outlier Detection for Streaming Data)
Stars: ✭ 87 (+93.33%)
feverfast, extensible, versatile event router for Suricata's EVE-JSON format
Stars: ✭ 47 (+4.44%)
WeakforcedAnti-Abuse for servers at authentication time
Stars: ✭ 84 (+86.67%)
ldap write support👥🖎 create, edit and delete LDAP users and groups from Nextcloud
Stars: ✭ 15 (-66.67%)
LID-DSLID-DS is an intrusion detection data simulation framework.
Stars: ✭ 32 (-28.89%)
Osql ExperimentalA community-oriented fork of osquery with support for cmake, public CI testing, and regular releases
Stars: ✭ 62 (+37.78%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (+0%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-80%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+14737.78%)
DeepLearning-IDSNetwork Intrusion Detection System using Deep Learning Techniques
Stars: ✭ 76 (+68.89%)
FlightsimA utility to generate malicious network traffic and evaluate controls
Stars: ✭ 525 (+1066.67%)
SecumlMachine Learning for Computer Security
Stars: ✭ 221 (+391.11%)
MaltrailMalicious traffic detection system
Stars: ✭ 4,296 (+9446.67%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-53.33%)
OsquerySQL powered operating system instrumentation, monitoring, and analytics.
Stars: ✭ 18,475 (+40955.56%)
Wazuh DockerWazuh - Docker containers
Stars: ✭ 213 (+373.33%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-71.11%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (+355.56%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-53.33%)
MStreamAnomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 68 (+51.11%)
apporderNextcloud app to enable sorting inside the app menu
Stars: ✭ 30 (-33.33%)
sandfly-setupSandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (+0%)
BriaridsAn All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.
Stars: ✭ 187 (+315.56%)