proof of concept intrusion mitigation tool written in go for windows. (Sysmon eventlogs and Sigma .yml signature rules)
-
Updated
Nov 17, 2019 - Go
proof of concept intrusion mitigation tool written in go for windows. (Sysmon eventlogs and Sigma .yml signature rules)
automatic enumeration and maintenance of Suricata monitoring interfaces
Super fast Go server for intrusion detection and prevention on Apache logs
802.11 IDS, visualizer, and analytics platform for the web
A lightweight tool to score network traffic and flag anomalies
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
Real-time HTTP Intrusion Detection
fast, extensible, versatile event router for Suricata's EVE-JSON format
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
A utility to safely generate malicious network traffic patterns and evaluate controls.
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
CoreDNS plugin exposing Prometheus metrics for malicious or prohibited requests
🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷
🚀 A lightweight, fast, simple and complete solution for traffic analysis and intrusion detection.
Add a description, image, and links to the intrusion-detection topic page so that developers can more easily learn about it.
To associate your repository with the intrusion-detection topic, visit your repo's landing page and select "manage topics."