SigmaGeneric Signature Format for SIEM Systems
Stars: ✭ 4,418 (+14626.67%)
Remote-Integrity-ToolThe DearBytes remote integrity tool is an IDS (Intrusion Detection System) that keeps track of files on a remote server and logs an event if a file gets added, removed or modified.
Stars: ✭ 12 (-60%)
Threatbus🚌 The missing link to connect open-source threat intelligence tools.
Stars: ✭ 139 (+363.33%)
ShortidSuper short, fully unique, non-sequential and URL friendly Ids
Stars: ✭ 657 (+2090%)
FragscapyFragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multiple successive tests to determine which options can be used to evade firewalls and IDS.
Stars: ✭ 52 (+73.33%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+9753.33%)
UTMFWUTM Firewall on OpenBSD
Stars: ✭ 104 (+246.67%)
ids高效的分布式id生成器,每个客户端实例tps可达到100万,服务端毫无压力。即使服务端宕机了,id生成依然可用。支持多数据中心,支持id加密。
Stars: ✭ 47 (+56.67%)
Uuid RandomFastest UUID with cryptographic PRNG for JS
Stars: ✭ 87 (+190%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+22156.67%)
moleYara powered NIDS with high speed packet capture powered by PF_RING
Stars: ✭ 51 (+70%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (+583.33%)
Suricata RulesSuricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等
Stars: ✭ 397 (+1223.33%)
hashids.pmHashids, ported for Perl
Stars: ✭ 15 (-50%)
Hashids.jsA small JavaScript library to generate YouTube-like ids from numbers.
Stars: ✭ 3,525 (+11650%)
SuricataSuricata git repository maintained by the OISF
Stars: ✭ 2,274 (+7480%)
ProbeManagerCentralize Management of Intrusion Detection System like Suricata Bro Ossec ...
Stars: ✭ 73 (+143.33%)
Sagan** README ** This repo has MOVED to https://github.com/quadrantsec/sagan
Stars: ✭ 236 (+686.67%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+2553.33%)
ScanrDetect x86 shellcode in files and traffic.
Stars: ✭ 16 (-46.67%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (+596.67%)
SelksA Suricata based IDS/IPS distro
Stars: ✭ 707 (+2256.67%)
govppGo toolset for the VPP.
Stars: ✭ 119 (+296.67%)
HashidsA small PHP library to generate YouTube-like ids from numbers. Use it when you don't want to expose your database ids to the user.
Stars: ✭ 4,596 (+15220%)
WhidsOpen Source EDR for Windows
Stars: ✭ 188 (+526.67%)
ML-IDSAn IDS implementation using machine learning
Stars: ✭ 30 (+0%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+10413.33%)
EveboxWeb Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search
Stars: ✭ 286 (+853.33%)
firewall-controllerA kubernetes controller running on bare-metal firewalls, creating nftables rules, configures suricata, collects network metrics
Stars: ✭ 37 (+23.33%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (+3.33%)
Suricata UpdateThe tool for updating your Suricata rules.
Stars: ✭ 143 (+376.67%)
gonidsgonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (+366.67%)
snort-ruleparses and generates Snort rules similar to PERL's Snort::Rule
Stars: ✭ 12 (-60%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (+50%)
Snort RulesAn UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (+350%)
graylog-zeek-content-packBRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to capture and index BRO/Zeek logs coming from a remote sensor.
Stars: ✭ 18 (-40%)
prickly-peteA script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
Stars: ✭ 29 (-3.33%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-30%)
Particle64 bit ID Generator
Stars: ✭ 125 (+316.67%)
harshHashids implementation in Rust
Stars: ✭ 48 (+60%)
ansibleAnsible playbook automation for pfelk
Stars: ✭ 23 (-23.33%)
IPRadar2Real-time detection and defense against malicious network activity and policy violations (exploits, port-scanners, advertising, telemetry, state surveillance, etc.)
Stars: ✭ 20 (-33.33%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+4060%)
eewidsEasily Expandable Wireless Intrusion Detection System
Stars: ✭ 25 (-16.67%)
Optimus🤖 Id obfuscation based on Knuth's multiplicative hashing method for PHP.
Stars: ✭ 1,084 (+3513.33%)
dpdk engineer manual【冲破内核瓶颈,让I/O性能飙升】DPDK工程师手册,官方文档,最新视频,开源项目,实战案例,论文,大厂内部ppt,知名工程师一览表
Stars: ✭ 535 (+1683.33%)
shortidSuper short, fully unique, non-sequential and URL-friendly Ids
Stars: ✭ 20 (-33.33%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-70%)