Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for cybersecurity network security
cybersecurity
x
network-security
x
27 search results found
Securityonion
⭐
2,589
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Blackhat Python3
⭐
1,763
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Malcolm
⭐
1,619
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Digital Forensics Guide
⭐
1,232
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Captfencoder
⭐
1,088
Captfencoder is opensource a rapid cross platform network security tool suite, providing network security related code conversion, classical cryptography, cryptography, asymmetric encryption, miscellaneous tools, and aggregating all kinds of online tools.
Nfstream
⭐
1,043
NFStream: a Flexible Network Data Analysis Framework.
Violent Python3
⭐
867
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Scirius
⭐
552
Scirius is a web application for Suricata ruleset management and threat hunting.
Malcolm
⭐
305
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Intrusion Detection System Using Machine Learning
⭐
248
Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGBoost, stacking, k-means, Bayesian optimization..)
Network Intrusion Detection
⭐
195
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
Pow Shield
⭐
190
Project dedicated to fight Layer 7 DDoS with proof of work, with an additional WAF and controller. Completed with full set of features and containerized for rapid and lightweight deployment.
Preferred Network List Sniffer
⭐
98
A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.
Superlibrary
⭐
94
Information Security Library
Cybersecurity Entry Level
⭐
92
Curso para aprender Ciberseguridad desde cero, en español y 100% gratis. Abarca 5 dominios fundamentales que necesitas conocer para poder dar tus primeros pasos en este apasionante mundo.
Nist To Tech
⭐
88
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Trafficwatch
⭐
74
TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files
Intrusion Detection System Using Cnn And Transfer Learning
⭐
54
Code for intrusion detection system (IDS) development using CNN models and transfer learning
Cybersecurity_conferences
⭐
48
List of some cybersecurity conferences
Icmpwatch
⭐
45
ICMPWatch: ICMP Packet Sniffer
Zeek Network Security Monitor
⭐
42
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Nlp4cybersecurity
⭐
40
NLP model and tech for cyber security tasks
Nerd
⭐
29
Network Entity Reputation Database
Tsuki Sploit
⭐
24
A USB-based script for Ethical hacking with multiple attacks
Kalnemix
⭐
16
A powerful command-line tool for website reconnaissance and information gathering
Network Traffic Analysis
⭐
14
SSH traffic analysis
Honeydb Python
⭐
11
HoneyDB Python Module
Snort Gui
⭐
11
SNORT GUI: Your very own trusted blueteam forensic companion for SNORT IDS. OPTIMIZED, SECURE AND ABSOLUTELY FREE!
Basicgopot
⭐
10
Honeypot for file uploads. Written in Go.
Networking Essentials
⭐
9
📡 Foundational understanding of Computer Networking for learners
Cyberattack Detection
⭐
8
Cyber Attack Detection thanks to Machine Learning Algorithms
Network Intrusion Detection Using Machine Learning
⭐
8
A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach
Spidertrap Rs
⭐
5
A simple trap for web crawlers
Related Searches
Python Cybersecurity (804)
Security Cybersecurity (402)
1-27 of 27 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.