Real-time HTTP Intrusion Detection
-
Updated
Feb 13, 2024 - Go
Real-time HTTP Intrusion Detection
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
A utility to safely generate malicious network traffic patterns and evaluate controls.
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
A lightweight tool to score network traffic and flag anomalies
fast, extensible, versatile event router for Suricata's EVE-JSON format
🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷
802.11 IDS, visualizer, and analytics platform for the web
🚀 A lightweight, fast, simple and complete solution for traffic analysis and intrusion detection.
automatic enumeration and maintenance of Suricata monitoring interfaces
CoreDNS plugin exposing Prometheus metrics for malicious or prohibited requests
proof of concept intrusion mitigation tool written in go for windows. (Sysmon eventlogs and Sigma .yml signature rules)
Super fast Go server for intrusion detection and prevention on Apache logs
Add a description, image, and links to the intrusion-detection topic page so that developers can more easily learn about it.
To associate your repository with the intrusion-detection topic, visit your repo's landing page and select "manage topics."