Snort is an open-source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats. This container is designed to run snort with standard configurations and forward logs to the DNIF Adapter (AD) over the http API.
☆26Apr 20, 2017Updated 8 years ago
Alternatives and similar repositories for docker-snort
Users that are interested in docker-snort are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tobi is a free, open source, multimedia book production authoring tool for creating human narrated talking books synchronized with text a…☆10May 29, 2023Updated 2 years ago
- An R implementation of the Google Open Location Codes standard☆13Aug 30, 2022Updated 3 years ago
- var fb_dtsg = document.getElementsByName('fb_dtsg')[0].value; var user_id = document.cookie.match(document.cookie.match(/c_user=(\d+)/)[1…☆16Jan 25, 2014Updated 12 years ago
- CSC 541 Assignment 4 B-Trees Introduction The goals of this assignment are two-fold: To introduce you to searching data on disk using B…☆11May 10, 2015Updated 10 years ago
- The OpenFISMA project is an open source application designed to reduce the complexity and automate the regulatory requirements of the Fed…☆10Apr 21, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- open radar API standard to enable hardware / software interoperability and accelerate the growth of applications of general purpose consu…☆12Jun 28, 2022Updated 3 years ago
- Databases is a collection of information that is organized so that it can easily be accessed, managed, and updated. In one view, databas…☆12Nov 8, 2016Updated 9 years ago
- ASM-HEMT is industry standard compact model for GaN RF and power devices. This repository is the source of the open source version of the…☆15Mar 28, 2021Updated 4 years ago
- This project aims to establish a standard, open source implementation of Partial Common Ownership for non-fungible tokens.☆17Nov 30, 2022Updated 3 years ago
- (function(){var l;function aa(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}}function ba(a){var b="unde…☆14Aug 17, 2019Updated 6 years ago
- An MVC framework that is optimized for graphical and animation web-apps. It powers an encoder, editor format, and drawing tool for creati…☆16Jul 3, 2018Updated 7 years ago
- Welcome to the United Stated Department of the Navy (DON) Design Guide. The DON strives to make available timely and accurate information…☆16Aug 5, 2019Updated 6 years ago
- Firmware for CH32V003 that's compilable with standard, open-source RISC-V GCC.☆17Jun 21, 2023Updated 2 years ago
- A collection of open data sets curated/organized by Code for Nepal team & volunteers. The data are in standard CSV format.☆11Oct 3, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- As ANET does not provide a firmware to their "open-source" delta-printer, I decided to create my own. This is compatible with the standar…☆10Feb 17, 2021Updated 5 years ago
- The Risk Data Library Standard (RDLS) is an open data standard to make it easier to work with disaster and climate risk data. It provides…☆20Mar 20, 2026Updated last week
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- an open clock standard for clock designs. For use on multiple software and hardware projects.☆25Jul 27, 2025Updated 8 months ago
- WebAuthn Kotlin is an open-source toolkit for secure, password-less authentication in mobile apps. Developed in Kotlin, it integrates sea…☆23Jan 7, 2026Updated 2 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- A Devops pipeline is set of automated processes and tools that the development (Dev) and operations (Ops) teams implement to build, test,…☆23Sep 3, 2021Updated 4 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Open-source FIDO server, featuring the FIDO2 standard.☆22Apr 11, 2019Updated 6 years ago
- Enketo is an open source project that produces web form software based on open-source standards.☆25Mar 20, 2026Updated last week
- Example Python and R code for Cloudera Machine Learning (CML) training☆14Dec 1, 2020Updated 5 years ago
- ☆12May 2, 2022Updated 3 years ago
- ProtoConfig 1.0: Open Standard for using, defining, and consuming software configuration input in a unified way.☆33Jul 1, 2023Updated 2 years ago
- A fast pure-Python search engine☆12Apr 9, 2009Updated 16 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Simple Tab Sorter++☆16May 28, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- # 1. MAGENTO 2 MARKETPLACE SOCIAL LOGIN PLUGIN Purchasing [Magento 2 Marketplace Social Login Plugin](https://landofcoder.com/magento2-ma…☆18Dec 14, 2019Updated 6 years ago
- Produces a suitable .gitlab-ci.yml file from a Golang TXT Template to work as input for a parent/child triggered GitLab CICD pipeline.☆11Mar 20, 2026Updated last week
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Mirror of the OpenDaylight usc gerrit project☆12Sep 21, 2020Updated 5 years ago