cedricbonhomme / pyHIDSLinks
A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
☆59Updated 2 weeks ago
Alternatives and similar repositories for pyHIDS
Users that are interested in pyHIDS are comparing it to the libraries listed below
Sorting:
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Updated 4 months ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Updated 6 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- Passive DNS V2☆60Updated 11 years ago
- Malware Sinkhole List in various formats☆103Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Evading Snort Intrusion Detection System.☆78Updated 3 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- collector/runner☆65Updated 4 months ago
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Simple High Interaction Honeypot Solution for SMB protocol☆49Updated 4 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆85Updated 2 years ago
- Minimal, consistent Python API for building integrations with malware sandboxes.☆139Updated last year
- ☆35Updated last year
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated last week
- Automated handling of data feeds for security teams☆138Updated 2 weeks ago
- Find abuse contacts for observables☆70Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆155Updated 3 months ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 4 years ago
- ☆51Updated 6 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Updated 10 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Detect HTTP stalling attacks like slowloris with Bro☆19Updated 7 years ago
- ☆14Updated 7 years ago