ema / systemtap-ids-poc
Intrusion Detection System based on Anomaly Detection. Uses the SystemTap dynamic instrumentation framework for the Linux kernel.
☆13Updated 13 years ago
Alternatives and similar repositories for systemtap-ids-poc
Users that are interested in systemtap-ids-poc are comparing it to the libraries listed below
Sorting:
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 10 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- A security scanner for Wordpress blogging engine☆32Updated 9 years ago
- python based backdoor software☆17Updated 13 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Updated 7 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- A List of InfoSec Resources☆10Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- The ModSecurity Pcap Connector☆27Updated 9 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 11 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆21Updated 9 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆17Updated 9 years ago
- IRMA ansible☆24Updated 8 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Updated 6 months ago
- Prometheus Firewall Analyzer☆47Updated 10 years ago