Application Layer IDS/IPS with iptables
☆77Nov 26, 2018Updated 7 years ago
Alternatives and similar repositories for fwsnort
Users that are interested in fwsnort are comparing it to the libraries listed below
Sorting:
- psad: Intrusion Detection and Log Analysis with iptables☆417Jun 11, 2023Updated 2 years ago
- Single Packet Authorization > Port Knocking☆1,314Nov 26, 2025Updated 3 months ago
- XDP FW: eXpress Data Path FireWall module☆27Nov 22, 2023Updated 2 years ago
- Trove guest image elements☆12Apr 6, 2017Updated 8 years ago
- An interactive command-line deauther for macOS.☆73Jan 18, 2019Updated 7 years ago
- Maltego entity pack encompassing the entire STIX 1.2 data model and a targeted subset of the CybOX 2.1 data model☆11Mar 24, 2016Updated 9 years ago
- A collection of malware that we use for testing and training☆12Nov 11, 2020Updated 5 years ago
- Observable Network Appliance for passive monitoring of a network☆17May 8, 2025Updated 9 months ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- ☆18Oct 2, 2018Updated 7 years ago
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The…☆16Jun 5, 2024Updated last year
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 6 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- ☆18Apr 11, 2019Updated 6 years ago
- Network Security Monitoring Framework☆48Oct 19, 2012Updated 13 years ago
- Project infrastructure for FireHOL☆23Dec 31, 2020Updated 5 years ago
- Suricata Extreme Performance Tuning guide☆213Mar 15, 2018Updated 7 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- ☆41Mar 9, 2017Updated 8 years ago
- Capturing, analysing and responding to cyber attacks☆173Sep 13, 2024Updated last year
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Jul 24, 2015Updated 10 years ago
- A log parsing engine written in Java for high performance. Additionally, logger is also highly configurable.☆15Aug 13, 2018Updated 7 years ago
- OpenVAS / Greenbone Vulnerability Manager (GVM) 11 Install Script for Kali Linux☆24Oct 1, 2020Updated 5 years ago
- A thread-safe and mutation-safe LRU cache for Python.☆26Mar 18, 2023Updated 2 years ago
- graph visualization tool☆77Oct 1, 2015Updated 10 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago
- Analysis Correlation Engine☆26Sep 8, 2019Updated 6 years ago
- Multi-threaded web application directory bruteforcer☆28Feb 4, 2019Updated 7 years ago
- Simple DNS Client & Library in pure Nim☆26Jun 14, 2023Updated 2 years ago
- Suricata rule and intel index☆33Jan 13, 2026Updated last month
- An extensible honeypot framework☆95Jul 15, 2022Updated 3 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 9 years ago
- ☆18Jul 10, 2025Updated 7 months ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- ☆11Jun 10, 2020Updated 5 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆511Feb 27, 2026Updated last week