simple network signature/rule intrusion detection system written in Python.
☆15Jun 10, 2024Updated last year
Alternatives and similar repositories for -IDS
Users that are interested in -IDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆51Aug 12, 2017Updated 8 years ago
- OS build toolkit for Live CD ISO images☆13Dec 23, 2020Updated 5 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 6 years ago
- A custom installer script for Arch Linux.☆10Mar 20, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- BlackArch menu, theme, and config for Openbox.☆10Mar 14, 2023Updated 3 years ago
- ☆11Aug 20, 2025Updated 9 months ago
- These are my dotfiles for my Arch Linux Machine☆11Aug 6, 2023Updated 2 years ago
- My Xfce Linux dotfiles☆10Jun 17, 2024Updated last year
- ☆13Apr 14, 2026Updated last month
- ☆15Feb 27, 2017Updated 9 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 6 years ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆21Apr 11, 2026Updated last month
- Setup for Openbox EOS-CE☆15Oct 28, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆10Sep 6, 2021Updated 4 years ago
- My bspwm configuration.☆14Sep 30, 2023Updated 2 years ago
- Create customized CentOS ISO images☆19Apr 6, 2026Updated last month
- Intrusion Detection System - IDS example using Dense, Conv1d and Lstm layers in Keras / TensorFlow☆25Apr 28, 2023Updated 3 years ago
- My ricing setup, powered by Arch Linux☆15Apr 13, 2025Updated last year
- Alters the Mozilla Firefox behaviour extensively and holistically with Firefox customization file(s). The main focus in this project is o…☆22Jan 21, 2018Updated 8 years ago
- Porteus - Portable Linux☆17Jul 15, 2011Updated 14 years ago
- Using NSL_KDD data☆29Mar 3, 2019Updated 7 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Disk image builder for SDesk GNU/Linux.☆21Oct 18, 2025Updated 7 months ago
- Awesome Openbox Theme Collections!☆20Dec 4, 2020Updated 5 years ago
- BlackArch menu, theme, and config for Xfce.☆16Apr 20, 2021Updated 5 years ago
- Subgraph Metaproxy is a proxy redirector.☆20Jun 12, 2017Updated 8 years ago
- Machine-learning-based intrusion detection☆38Jul 13, 2018Updated 7 years ago
- 🕷️ Kali & Kali Purple Linux Configuration☆22Nov 14, 2024Updated last year
- Amy Themes For Plasma Desktop☆34Dec 14, 2025Updated 5 months ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆42Jul 20, 2018Updated 7 years ago
- ☆18Jul 24, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 3 years ago
- The Amnesic Incognito Live System☆38Jul 13, 2021Updated 4 years ago
- Liberté Linux, a live distribution serving as a communication aid in hostile environments.☆80Feb 23, 2016Updated 10 years ago
- Arch Linux post-installation setup and config scripts☆30Feb 3, 2023Updated 3 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- Tamper resistant, off-site audit logging for WordPress☆14Jan 14, 2026Updated 4 months ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆46Jun 3, 2019Updated 6 years ago