g3tsyst3m / BriarIDSView external linksLinks
An All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.
☆228Feb 26, 2024Updated last year
Alternatives and similar repositories for BriarIDS
Users that are interested in BriarIDS are comparing it to the libraries listed below
Sorting:
- Network Security Monitoring on Raspberry Pi type devices☆791Feb 9, 2018Updated 8 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,107Apr 16, 2021Updated 4 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆45Jun 6, 2019Updated 6 years ago
- Suricata Extreme Performance Tuning guide☆213Mar 15, 2018Updated 7 years ago
- Snort/Suricata DAQ module with DPDK patch☆11Apr 10, 2024Updated last year
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆284Jul 10, 2025Updated 7 months ago
- Side channel-based network measurement tools.☆15Sep 1, 2015Updated 10 years ago
- viewssld is a free, open source, non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort, and other Network Intrusion Detecti…☆74Aug 13, 2017Updated 8 years ago
- A Suricata based NDR distribution☆1,590Sep 13, 2025Updated 5 months ago
- Use surrounding WiFi networks to find the geolocation of the device☆19Sep 25, 2018Updated 7 years ago
- A virtual PDF analysis framework☆16Jan 31, 2014Updated 12 years ago
- Auto Installer Script for Cuckoo Sandbox☆164May 31, 2018Updated 7 years ago
- Generates IP, while Excluding/Including specific IP blocks. Useful in Mass Scanning.☆24Dec 24, 2014Updated 11 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆273Feb 26, 2014Updated 11 years ago
- psad: Intrusion Detection and Log Analysis with iptables☆417Jun 11, 2023Updated 2 years ago
- Snort + Barnyard2 + Pulledpork → The easy way!☆170Mar 7, 2021Updated 4 years ago
- LinkedIn reconnaissance tool☆55Dec 17, 2021Updated 4 years ago
- Easily Expandable Wireless Intrusion Detection System☆30Oct 12, 2020Updated 5 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- A program that uses xapian to index the flat file databases used by nfdump or flow-tools☆36Mar 26, 2018Updated 7 years ago
- Repo for autosnort scripts.☆156Oct 11, 2020Updated 5 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Jan 12, 2026Updated last month
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- My pentest cheat sheet☆15Apr 27, 2017Updated 8 years ago
- Network Forensics Bro scripts & pcap samples☆63Mar 11, 2014Updated 11 years ago
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Jan 20, 2018Updated 8 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Aug 2, 2021Updated 4 years ago
- Volatility plugins created by the author☆44Oct 2, 2015Updated 10 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated this week
- Encrypted Messaging Built Into Bitcoin☆14Mar 29, 2019Updated 6 years ago
- Scripts used to create ISO installers of ROCK for offline installation.☆10Mar 13, 2023Updated 2 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆42Sep 21, 2023Updated 2 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127May 31, 2019Updated 6 years ago