cys3c / Toucan-IDS
An Intrusion Detection System written in Python
☆25Updated last year
Alternatives and similar repositories for Toucan-IDS:
Users that are interested in Toucan-IDS are comparing it to the libraries listed below
- Evading Snort Intrusion Detection System.☆76Updated 3 years ago
- intrusion detection☆23Updated 7 years ago
- A Python based Intrusion Detection and Prevention System. Uses Scapy to sniff packets at a specific interface, extract the remote IPs, sc…☆9Updated 7 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- ☆44Updated 7 years ago
- Python 3 library to request https://crt.sh/☆31Updated 2 months ago
- Botnet Simulation Framework☆78Updated 4 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆59Updated this week
- A Python script that generates Snort IDS rules from network packets☆25Updated 7 years ago
- My notes on various topics☆64Updated last year
- A simple tool to organise large malicious/benign files into a organised Structure.☆1Updated 6 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 10 months ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆27Updated 7 years ago
- Malware Machine Learning☆27Updated 6 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆74Updated 7 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated last year
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 4 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆15Updated 5 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Updated 6 years ago
- Python3 Metasploit automation library☆21Updated 2 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 4 years ago
- DHCP attack tool☆19Updated 4 months ago
- Python wrapper for the Mitre ATT&CK framework API☆27Updated 6 years ago
- Checkpot Honeypot Checker☆43Updated 6 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆16Updated 2 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago