ema / systemtap-ids-poc
Intrusion Detection System based on Anomaly Detection. Uses the SystemTap dynamic instrumentation framework for the Linux kernel.
☆13Updated 13 years ago
Related projects ⓘ
Alternatives and complementary repositories for systemtap-ids-poc
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- Mass DNS resolution tool☆36Updated 3 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Updated 10 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆16Updated 3 weeks ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- It's like a polaroid, but for domains☆24Updated 9 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 10 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆21Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- ☆25Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- ☆10Updated 7 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 9 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Updated 10 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- Malware analysis using Docker project☆25Updated 8 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 9 years ago
- encoding format, library, and utilities for passive DNS data☆26Updated 7 months ago
- IRMA ansible☆24Updated 7 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago