ema / systemtap-ids-poc
Intrusion Detection System based on Anomaly Detection. Uses the SystemTap dynamic instrumentation framework for the Linux kernel.
☆13Updated 13 years ago
Alternatives and similar repositories for systemtap-ids-poc:
Users that are interested in systemtap-ids-poc are comparing it to the libraries listed below
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Mass DNS resolution tool☆36Updated 4 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- ☆10Updated 7 years ago
- ssh key exchange layer for scapy☆13Updated 10 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Updated 8 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆21Updated 8 years ago
- Ansible Provisioned Security Testing Platform☆17Updated 8 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆65Updated 13 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 10 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Updated 4 months ago
- Recon system hardening scanner☆47Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- The ModSecurity Pcap Connector☆26Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆17Updated 9 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- A List of InfoSec Resources☆10Updated 10 years ago