cys3c / Toucan-IDSLinks
An Intrusion Detection System written in Python
☆26Updated last year
Alternatives and similar repositories for Toucan-IDS
Users that are interested in Toucan-IDS are comparing it to the libraries listed below
Sorting:
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆59Updated 3 months ago
- python wrapper to use tshark for file extraction from the command line.☆27Updated 6 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 5 years ago
- Checkpot Honeypot Checker☆43Updated 6 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- Automatically exported from code.google.com/p/plcscan☆58Updated 10 years ago
- bap - http Basic Authentication honeyPot☆49Updated 10 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- ☆43Updated 2 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Python wrapper for the Mitre ATT&CK framework API☆30Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆57Updated 8 months ago
- A SIEM inspired by HECTOR, built on Django.☆29Updated 6 years ago
- Python 3 script for interacting with Shodan API☆20Updated 7 months ago
- Scan for open S3 buckets and dump☆37Updated 7 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.☆74Updated 2 years ago
- A Python script that generates Snort IDS rules from network packets☆25Updated 7 years ago
- ☆44Updated 8 years ago
- ☆45Updated 8 years ago
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆17Updated 6 years ago
- Botnet Simulation Framework☆78Updated 4 years ago
- ☆33Updated 4 months ago