wazuh-ansibleWazuh - Ansible playbook
Stars: ✭ 166 (+207.41%)
Mutual labels: log-analysis, incident-response, ids, intrusion-detection, pci-dss, compliance, security-hardening, loganalyzer, vulnerability-detection, ossec, wazuh, policy-monitoring, security-awareness, file-integrity-management WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+5740.74%)
Mutual labels: log-analysis, incident-response, ids, intrusion-detection, pci-dss, compliance, security-hardening, loganalyzer, vulnerability-detection, ossec, wazuh, policy-monitoring, security-awareness, file-integrity-management wazuh-puppetWazuh - Puppet module
Stars: ✭ 25 (-53.7%)
Mutual labels: log-analysis, incident-response, intrusion-detection, pci-dss, compliance, security-hardening, loganalyzer, vulnerability-detection, ossec, wazuh, policy-monitoring, security-awareness, file-integrity-management Wazuh DockerWazuh - Docker containers
Stars: ✭ 213 (+294.44%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-83.33%)
Ossec HidsOSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Stars: ✭ 3,580 (+6529.63%)
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+16820.37%)
SiacSIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (+85.19%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+12264.81%)
ContentSecurity automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+2157.41%)
lunasecLunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
Stars: ✭ 1,261 (+2235.19%)
LogESPOpen Source SIEM (Security Information and Event Management system).
Stars: ✭ 162 (+200%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (-42.59%)
Snort RulesAn UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (+150%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-16.67%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+572.22%)
WAZUH-OSSECWAZUH - The Open Source Security Platform Installation
Stars: ✭ 79 (+46.3%)
MarsnakeSystem Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-70.37%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+16277.78%)
interceptINTERCEPT / Policy as Code Static Analysis Auditing / SAST
Stars: ✭ 54 (+0%)
ProwlerProwler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+8346.3%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+5374.07%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+2211.11%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (+279.63%)
PatrowldocsPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (+94.44%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-61.11%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (+287.04%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (+100%)
siemstressVery basic CLI SIEM (Security Information and Event Management system).
Stars: ✭ 24 (-55.56%)
Immudbimmudb - world’s fastest immutable database, built on a zero trust model
Stars: ✭ 3,743 (+6831.48%)
PatrowlenginesPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (+200%)
Psadpsad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (+451.85%)
prowlerProwler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+14800%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+225.93%)
MixewayScannerMixeway Scanner is Spring Boot application which aggregate integration with number of OpenSource Vulnerability scanners - both SAST and DAST types
Stars: ✭ 15 (-72.22%)
firewall-controllerA kubernetes controller running on bare-metal firewalls, creating nftables rules, configures suricata, collects network metrics
Stars: ✭ 37 (-31.48%)
baneChainlink security and orchestration tools for Ubuntu server
Stars: ✭ 6 (-88.89%)
INDXRipperCarve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-40.74%)
hashids.pmHashids, ported for Perl
Stars: ✭ 15 (-72.22%)
beepbeep-3An event stream processor anyone can use
Stars: ✭ 20 (-62.96%)
xssfinderToolset for detecting reflected xss in websites
Stars: ✭ 105 (+94.44%)
guardianGuardian is a tool for extensible and universal data access with automated access workflows and security controls across data stores, analytical systems, and cloud products.
Stars: ✭ 127 (+135.19%)
aparoidStatic and dynamic Android application security analysis
Stars: ✭ 62 (+14.81%)
UTMFWUTM Firewall on OpenBSD
Stars: ✭ 104 (+92.59%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+314.81%)
ec2-metadata-filterEnhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)
Stars: ✭ 32 (-40.74%)
gradejsGradeJS analyzes production Webpack bundles without having access to the source code of a website. Instantly see vulnerabilities, outdated packages, and more just by entering a web application URL.
Stars: ✭ 362 (+570.37%)
macOS-irPrototype to collect data and analyse it from a compromised macOS device.
Stars: ✭ 16 (-70.37%)
prickly-peteA script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
Stars: ✭ 29 (-46.3%)
patton-cliThe knife of the Admin & Security auditor
Stars: ✭ 42 (-22.22%)
LOCKLEVELA prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber
Stars: ✭ 98 (+81.48%)
yara-exporterExporting MISP event attributes to yara rules usable with Thor apt scanner
Stars: ✭ 22 (-59.26%)
havengrc☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬
Stars: ✭ 83 (+53.7%)