cys3c / Toucan-IDS
An Intrusion Detection System written in Python
☆26Updated last year
Alternatives and similar repositories for Toucan-IDS:
Users that are interested in Toucan-IDS are comparing it to the libraries listed below
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- python wrapper to use tshark for file extraction from the command line.☆27Updated 6 years ago
- ☆44Updated 7 years ago
- Python API for the CVSS v3☆58Updated 3 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆39Updated 7 years ago
- intrusion detection☆23Updated 7 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆58Updated last month
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆100Updated last year
- Python wrapper for the Mitre ATT&CK framework API☆28Updated 7 years ago
- Perform CVE lookup on cvedetails.com☆24Updated last year
- ☆42Updated 2 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆26Updated 8 years ago
- Simple High Interaction Honeypot Solution for SMB protocol☆48Updated 4 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆51Updated 6 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- bap - http Basic Authentication honeyPot☆48Updated 10 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 11 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Command and Control server on Slack☆28Updated 6 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated last year
- External NSE script library (Collection of unofficial scripts) - Feel free to submit your NSE scripts!☆32Updated 3 years ago
- ☆25Updated 5 years ago
- A Python script that generates Snort IDS rules from network packets☆25Updated 7 years ago
- ☆21Updated last year
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆63Updated 5 years ago