insightlake / Data-SecurityLinks
Enterprise Data Loss Prevention - Profile, Classify, Protect Enterprise Data
☆26Updated 2 years ago
Alternatives and similar repositories for Data-Security
Users that are interested in Data-Security are comparing it to the libraries listed below
Sorting:
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and perso…☆120Updated 9 months ago
- ☆109Updated 11 years ago
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago
- Machine Learning WAF Based☆94Updated 4 years ago
- ☆43Updated 2 years ago
- Open Source Data Protection/Privacy Regulatory Mapping Project☆181Updated last year
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 5 years ago
- ☆30Updated 2 years ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆110Updated 2 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆186Updated 2 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- zeek-scripts☆43Updated 6 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆82Updated this week
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- GO开发而成,用于NIDS HIDS 分析的规则引擎,使用WorkerPool 高性能检测,支持多字段 "和" "或" 检测, 支持频率检测☆77Updated 4 months ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆202Updated 3 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆545Updated 2 years ago
- ☆126Updated last year
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- Open Source Security Information and event Management☆94Updated 9 years ago
- suricata IDS的规则,测试在用的,部分自写的规则视情况放出。☆18Updated 6 years ago
- Suricata rules for network anomaly detection☆164Updated last month
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆141Updated 5 years ago
- How to Zeek Sysmon Logs!☆101Updated 3 years ago
- Awesome Honeypot Resource Collection. Including 250+ Honeypot tools, and 350+ posts about Honeypot.☆91Updated 5 years ago
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year