nbs-system / spike
A cool web interface to manage rules for naxsi
☆19Updated 8 years ago
Alternatives and similar repositories for spike
Users that are interested in spike are comparing it to the libraries listed below
Sorting:
- Because life is too short to waste your time transforming naxsi logs to rules by hand☆42Updated 7 years ago
- More Obvious Webmalware Repository☆15Updated 8 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆42Updated 7 months ago
- DNS Looking Glass☆76Updated 5 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Updated 7 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- NMap XML decoding for logstash☆28Updated 2 years ago
- [DEPRECATED] CEF (Common Event Format) input plugin for Graylog☆10Updated 3 years ago
- Python bindings for libModSecurity (aka ModSecurity v3)☆25Updated 6 years ago
- The ModSecurity Pcap Connector☆27Updated 9 years ago
- Intrusion Detection System based on Anomaly Detection. Uses the SystemTap dynamic instrumentation framework for the Linux kernel.☆13Updated 13 years ago
- Project infrastructure for FireHOL☆23Updated 4 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 6 years ago
- REST API test utility☆22Updated 5 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- ☆56Updated 7 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Flood Shield is a very fast http flood blocker☆30Updated 10 years ago
- ☆11Updated 4 years ago
- A program that uses xapian to index the flat file databases used by nfdump or flow-tools☆36Updated 7 years ago
- A Python implementation of JOSE☆14Updated 6 years ago
- A local scanner for vulnerable web applications☆38Updated last month
- ☆26Updated 6 years ago
- Daemon that runs on hosts and provides limited remote control access.☆20Updated 4 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- ☆10Updated 7 years ago
- DNS passive monitoring tool☆16Updated 7 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Updated 9 years ago