Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security intrusion detection
intrusion-detection
x
security
x
45 search results found
Osquery
⭐
20,877
SQL powered operating system instrumentation, monitoring, and analytics.
Fail2ban
⭐
9,695
Daemon to ban hosts that cause multiple authentication errors
Maltrail
⭐
5,572
Malicious traffic detection system
Ossec Hids
⭐
4,145
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Pi.alert
⭐
1,729
WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Ipban
⭐
1,411
Since 2011, IPBan is the worlds most trusted, free security software to block hackers and botnets. With both Windows and Linux support, IPBan has your dedicated or cloud server protected. Upgrade to IPBan Pro today and get a discount. Learn more at ↓
Acra
⭐
1,241
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Digital Forensics Guide
⭐
1,232
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Flightsim
⭐
1,097
A utility to safely generate malicious network traffic patterns and evaluate controls.
Agentsmith Hids
⭐
581
By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.
Wazuh Docker
⭐
532
Wazuh - Docker containers
Picosnitch
⭐
529
Monitor Network Traffic Per Executable, Beautifully Visualized
Wazuh Dashboard Plugins
⭐
376
Plugins for Wazuh Dashboard
Expose
⭐
249
An Intrusion Detection System library loosely based on PHP IDS
Osquery Extensions
⭐
241
osquery extensions by Trail of Bits
Wazuh Ansible
⭐
227
Wazuh - Ansible playbook
Blackbook
⭐
179
Blackbook of malware domains
Wazuh Documentation
⭐
151
Wazuh - Project documentation
Nfr
⭐
120
A lightweight tool to score network traffic and flag anomalies
Weakforced
⭐
114
Anti-Abuse for servers at authentication time
Sandfly Entropyscan
⭐
108
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
Cyber Security
⭐
89
Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities
Siac
⭐
87
SIAC is an enterprise SIEM built on open-source technology.
Suspicious_login
⭐
73
Detect and warn about suspicious IPs logging into Nextcloud
Wazuh Packages
⭐
69
Wazuh - Tools for packages creation
Sandfly Setup
⭐
57
Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
Wazuh Api
⭐
56
Wazuh - RESTful API
Logdata Anomaly Miner
⭐
53
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
Libellux Up And Running
⭐
53
Libellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Fever
⭐
48
fast, extensible, versatile event router for Suricata's EVE-JSON format
Pyhids
⭐
47
A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Wazuh Splunk
⭐
45
Wazuh - Splunk App
Wazuh Puppet
⭐
38
Wazuh - Puppet module
Wolfsentry
⭐
29
wolfSSL Intrusion Detection and Prevention System (IDPS)
Thebriarpatch
⭐
22
An extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Wazuh Chef
⭐
19
Wazuh - Chef cookbooks
Netmoth
⭐
16
🚀 A lightweight, fast, simple and complete solution for traffic analysis and intrusion detection.
Ip Blackhole
⭐
14
IP.blackhole.monster is an IP blacklist that uses multiple sensors to identify network attacks (e.g. SSH brute force) and spam incidents. All reports are evaluated and in case of too many incidents the responsible IP holder is informed to solve the problem.
Tr1pd
⭐
13
tamper resistant audit log
Sqlserverloginmonitor
⭐
11
Brute force attack prevention for remotely accessible SQL Server databases using PowerShell and Windows Task Scheduler API
Wazuh Bosh
⭐
10
Wazuh - Release for Bosh.io
Documentation
⭐
9
wolfSSL product manuals and documentation.
Nginx Waf Docker
⭐
9
docker modsecurity reverse proxy WAF based on nginx
Coredns Warnlist Plugin
⭐
7
CoreDNS plugin exposing Prometheus metrics for malicious or prohibited requests
Graylog Alphasoc
⭐
5
A content pack to render AlphaSOC alerts within Graylog
Related Searches
Security Vulnerabilities (11,840)
Laravel Security (11,580)
Php Security (10,611)
Javascript Security (2,859)
Html Security (2,284)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
C Security (886)
1-45 of 45 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.