TravisFSmith / SweetSecurityLinks
Network Security Monitoring on Raspberry Pi type devices
☆791Updated 7 years ago
Alternatives and similar repositories for SweetSecurity
Users that are interested in SweetSecurity are comparing it to the libraries listed below
Sorting:
- An All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.☆226Updated last year
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,031Updated 3 years ago
- A low to medium interaction honeypot.☆473Updated last year
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago
- Honeypot Intelligence with Splunk☆255Updated 7 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,028Updated 5 years ago
- Incident Response Forensic Framework☆606Updated 6 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆944Updated 4 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆507Updated 3 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆333Updated 5 years ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- ☆198Updated 3 years ago
- Malicious HTTP traffic explorer☆723Updated 2 years ago
- Credentials catching honeypot☆384Updated last year
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆417Updated 2 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆223Updated 5 years ago
- Modern Honey Network☆2,464Updated 11 months ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆549Updated 2 years ago
- Machinae Security Intelligence Collector☆535Updated last year
- Pulled Pork for Snort and Suricata rule management (from Google code)☆442Updated 4 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,047Updated 4 years ago
- Code + documentation for the public GreyNoise API☆314Updated 4 years ago
- Laika BOSS: Object Scanning System☆749Updated 11 months ago
- A smart gateway to stop cyber criminals - Sponsored by Falcon Guard☆254Updated 2 years ago
- Sandia Cyber Omni Tracker (SCOT)☆251Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,303Updated 10 months ago
- Web Application Honeypot☆589Updated last year
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆362Updated 2 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆657Updated 6 years ago