aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based IDS (Intrusion Detection Systems) using these rules
☆23Nov 9, 2018Updated 7 years ago
Alternatives and similar repositories for idsEventGenerator
Users that are interested in idsEventGenerator are comparing it to the libraries listed below
Sorting:
- FTester - firewall and IDS testing tool [historical]☆24Aug 2, 2017Updated 8 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- Snort rule parser/validator written in python.☆19May 16, 2023Updated 2 years ago
- Vermont (VERsatile MONitoring Toolkit) is an open-source software toolkit for the creation and processing of network flow data.☆61Feb 5, 2026Updated last month
- Pure python parser for Snort/Suricata rules.☆34Mar 13, 2024Updated 2 years ago
- Slack integration for Claude Code using MCP (Model Context Protocol). Enable your team to use Claude Code collaboratively through Slack.☆11Jun 30, 2025Updated 8 months ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- WIP: Debug Adapter Protocol (DAP) tools for Model Context Protocol (MCP)☆12Jul 2, 2025Updated 8 months ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- Ansible collection to support NetApp StorageGrid configuration.☆10Mar 3, 2026Updated 2 weeks ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- Find the best orientation for 3D printing (FFF/FDM) STL files using constrained global nonlinear optimization (DIRECT algorithm)☆11Jul 6, 2023Updated 2 years ago
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- ☆16Oct 3, 2023Updated 2 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- A CLI tool that simplifies Claude Code's hook system by replacing complex JSON configurations with clean YAML syntax, template-based data…☆32Updated this week
- Plugin providing AF_XDP support for Bro.☆14May 10, 2021Updated 4 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- Repositorio de documentación y referencias relativas al mundo de la ciberseguridad, creado y mantenido por la Comunidad de ProtAAPP☆13Feb 28, 2026Updated 3 weeks ago
- app.any.run malware submissions client☆17Jan 2, 2020Updated 6 years ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Jun 27, 2022Updated 3 years ago
- Snort/Suricata DAQ module with DPDK patch☆11Apr 10, 2024Updated last year
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated 2 weeks ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- This is an implementation of embedding and extracting a digital watermark in a PDF document. The code uses an LDPC code, a Hadamard code,…☆15Oct 28, 2017Updated 8 years ago
- ☆11Feb 8, 2021Updated 5 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- My personal macOS configuration☆28May 19, 2023Updated 2 years ago
- A friendly orchestrator platform from the future☆17Updated this week
- Cisco Threat Intelligence API☆75Updated this week
- Orujo allows the execution of several middlewares per route, working seamlessly with the standard net/http library.☆59Nov 22, 2015Updated 10 years ago