A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
☆59Apr 1, 2026Updated 3 weeks ago
Alternatives and similar repositories for pyHIDS
Users that are interested in pyHIDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- A Python client for the Global CVE Allocation System.☆18Mar 26, 2026Updated last month
- A collaborative platform for creating, editing and sharing JSON objects.☆74Apr 22, 2026Updated last week
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Automated OpenDXL Output information via IntelMQ☆14Jul 20, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆25Apr 21, 2026Updated last week
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Apr 21, 2026Updated last week
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Aug 9, 2022Updated 3 years ago
- BCP documents and website of GCVE☆56Updated this week
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated last year
- ☆11Apr 10, 2024Updated 2 years ago
- A watcher for contributors to various projects.☆10Sep 13, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- USB Scanning device☆34Apr 15, 2026Updated 2 weeks ago
- Sign JSON objects with ED25519 signatures☆12Sep 23, 2022Updated 3 years ago
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 6 years ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 10 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆120Updated this week
- An open source software directory and release tracker.☆25Apr 21, 2026Updated last week
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆280Apr 21, 2026Updated last week
- Capture a URL with Playwright☆31Updated this week
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- MISP Playbooks☆225Oct 14, 2025Updated 6 months ago
- A simple npm module that checks to see whether or not a medical marijuana patient's recommendation ID is valid or not.☆10Dec 11, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- ☆18May 22, 2024Updated last year
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Dec 16, 2020Updated 5 years ago
- ⚙️ 🦀 🕹️ Rewrite of the GB emulator☆18Feb 11, 2023Updated 3 years ago
- Dynamic Select with Images enhances HTML select elements by adding image support and custom HTML content. This lightweight JavaScript lib…☆14Jun 6, 2025Updated 10 months ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago