Tripwire / tripwire-open-sourceLinks
Open Source Tripwire®
☆901Updated last year
Alternatives and similar repositories for tripwire-open-source
Users that are interested in tripwire-open-source are comparing it to the libraries listed below
Sorting:
- Pulled Pork for Snort and Suricata rule management (from Google code)☆436Updated 4 years ago
- NIST Certified SCAP 1.2 toolkit☆1,530Updated last week
- A Suricata based IDS/IPS/NSM distro☆1,549Updated 11 months ago
- psad: Intrusion Detection and Log Analysis with iptables☆403Updated 2 years ago
- aide source code☆620Updated last week
- Greenbone Vulnerability Manager - The database backend for the Greenbone Community Edition☆321Updated this week
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,091Updated 4 years ago
- Wazuh - Ruleset☆456Updated 9 months ago
- Linux Malware Detection (LMD)☆1,278Updated 4 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,150Updated 3 weeks ago
- Greenbone Security Assistant - The web frontend for the Greenbone Community Edition☆239Updated this week
- Scalpel is an open source data carving tool. It is not being actively maintained.☆653Updated last year
- Automated deployment scripts for the RockNSM network hunting distribution.☆455Updated 2 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆461Updated last month
- Scirius is a web application for Suricata ruleset management and threat hunting.☆656Updated 3 weeks ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,022Updated 3 years ago
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,443Updated last month
- Fuzzy hashing API and fuzzy hashing tool☆736Updated 4 years ago
- OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, roo…☆4,773Updated 5 months ago
- A firewall for humans...☆1,530Updated 2 months ago
- Barnyard2 is a dedicated spooler for Snort's unified2 binary output format.☆352Updated last year
- Your Everyday Threat Intelligence☆1,881Updated last week
- Best Practice Auditd Configuration☆1,651Updated 5 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆416Updated last week
- Sguil client for NSM☆218Updated last year
- USBGuard is a software framework for implementing USB device authorization policies (what kind of USB devices are authorized) as well as …☆1,229Updated this week
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,703Updated last year
- Single Packet Authorization > Port Knocking☆1,211Updated 9 months ago
- Hardened Debian GNU/Linux distro auditing☆455Updated last year
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated 2 months ago