ema / systemtap-ids-pocLinks
Intrusion Detection System based on Anomaly Detection. Uses the SystemTap dynamic instrumentation framework for the Linux kernel.
☆13Updated 13 years ago
Alternatives and similar repositories for systemtap-ids-poc
Users that are interested in systemtap-ids-poc are comparing it to the libraries listed below
Sorting:
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 10 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 12 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- IRMA ansible☆24Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- python based backdoor software☆17Updated 13 years ago
- Snort in a Docker Container☆31Updated 11 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Updated 3 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 12 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 11 years ago
- Dines is the definitive answer to DNS testing☆21Updated 6 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Ansible Provisioned Security Testing Platform☆17Updated 8 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Updated 8 months ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- The ModSecurity Pcap Connector☆27Updated 9 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆22Updated 9 years ago
- YAPDNS☆39Updated 10 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆17Updated 9 years ago
- ssh key exchange layer for scapy☆13Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago
- Host files with DNS☆32Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Help summarize a PCAP file☆33Updated 13 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago