A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
☆59May 11, 2026Updated last week
Alternatives and similar repositories for pyHIDS
Users that are interested in pyHIDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- An Intrusion Detection System written in Python☆28Oct 28, 2023Updated 2 years ago
- A Python client for the Global CVE Allocation System.☆18May 11, 2026Updated last week
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- A collaborative platform for creating, editing and sharing JSON objects.☆74May 11, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automated OpenDXL Output information via IntelMQ☆14Jul 20, 2017Updated 8 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆26May 9, 2026Updated last week
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11May 11, 2026Updated last week
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- BCP documents and website of GCVE☆56Updated this week
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated last year
- ☆11Apr 10, 2024Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- USB Scanning device☆34Apr 15, 2026Updated last month
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- Sign JSON objects with ED25519 signatures☆12Sep 23, 2022Updated 3 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 10 years ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆31Jul 9, 2025Updated 10 months ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 10 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆121Updated this week
- Iterated Function Systems fractals with OCaml.☆35May 14, 2022Updated 4 years ago
- An open source software directory and release tracker.☆25May 11, 2026Updated last week
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆279Updated this week
- Capture a URL with Playwright☆31Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- MISP Playbooks☆228Oct 14, 2025Updated 7 months ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- ☆10Oct 1, 2019Updated 6 years ago
- Golang based web service to scan files with yara rules☆25Jul 6, 2017Updated 8 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- ☆18May 22, 2024Updated last year