cedricbonhomme / pyHIDSLinks
A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
☆59Updated 3 months ago
Alternatives and similar repositories for pyHIDS
Users that are interested in pyHIDS are comparing it to the libraries listed below
Sorting:
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Updated 2 months ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆72Updated 11 months ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- Suricata rule and intel index☆30Updated 2 months ago
- Find abuse contacts for observables☆70Updated 2 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- Passive DNS V2☆60Updated 11 years ago
- Honeypot repo☆48Updated 9 years ago
- Simple UDP honeypot script☆48Updated last year
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- An Intrusion Detection System written in Python☆26Updated last year
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆58Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Cyber Threat Intelligence Feeds☆96Updated 8 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Useful commands for infosec☆29Updated 2 years ago
- How to Zeek Sysmon Logs!☆101Updated 3 years ago
- ☆27Updated 7 years ago
- Passive DNS collection using Zeek☆182Updated 2 years ago
- ☆15Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆33Updated 4 months ago
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- ☆28Updated this week
- ☆35Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago