cedricbonhomme / pyHIDSLinks
A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
☆59Updated 2 months ago
Alternatives and similar repositories for pyHIDS
Users that are interested in pyHIDS are comparing it to the libraries listed below
Sorting:
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆82Updated 6 months ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- Malware Sinkhole List in various formats☆102Updated 3 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 2 months ago
- Simple High Interaction Honeypot Solution for SMB protocol☆49Updated 4 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 5 months ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Passive DNS collection using Zeek☆182Updated 2 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- Amun Honeypot☆63Updated last year
- Minimal, consistent Python API for building integrations with malware sandboxes.☆139Updated last year
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Updated 3 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆107Updated 4 years ago
- ☆35Updated last year
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- collector/runner☆65Updated 2 weeks ago
- Validates yara rules and tries to repair the broken ones.☆40Updated 5 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆102Updated 4 years ago
- Tools to interact with APTnotes reporting/index.☆104Updated 4 years ago
- Repository of yara rules☆60Updated 2 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- ☆27Updated 7 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago