Simple Network Intrusion Detection System. In python with Scapy.
☆38Jun 10, 2019Updated 6 years ago
Alternatives and similar repositories for Simple-NIDS
Users that are interested in Simple-NIDS are comparing it to the libraries listed below
Sorting:
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 2 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆73Mar 25, 2023Updated 2 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆172Dec 15, 2019Updated 6 years ago
- A Deep Learning approach toward creating a NIDS using python☆25Aug 8, 2023Updated 2 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69May 11, 2024Updated last year
- Machine Learning Based - Intrusion Detection System☆32Jun 21, 2022Updated 3 years ago
- I built this game for a short time fun.☆10Mar 31, 2014Updated 11 years ago
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆47Jun 13, 2022Updated 3 years ago
- TreeNET is a subnet-based topology discovery tool which is built upon ExploreNET, a subnet inference tool.☆11Oct 14, 2019Updated 6 years ago
- A solver for NuData Security☆11Sep 29, 2024Updated last year
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- Flipper zero NFC is mystery. KDF is the simple one in complicated☆13Sep 12, 2024Updated last year
- ReverseJS: A blog focused on reverse engineering Javascript☆10Feb 9, 2024Updated 2 years ago
- A lightweight WAF (web app firewall) written in Golang☆13May 3, 2021Updated 4 years ago
- A curated list of information technology merchandise offerings that benefit original creators and projects☆13May 1, 2025Updated 10 months ago
- NVD,CNNVD软件漏洞数据集,漏洞文本预处理,训练算法模型进行漏洞分类☆11Oct 13, 2018Updated 7 years ago
- Slightly outdated solver for Threat Metrix anti-bot☆24Dec 11, 2025Updated 2 months ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- A simple task manager in Django☆12Nov 14, 2024Updated last year
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- ☆11Feb 5, 2024Updated 2 years ago
- Applying Machine Learning model (SVM) into DDoS attack detection in SDN.☆49Jun 7, 2021Updated 4 years ago
- zhttp是一个对net/http标准库的封装,参考了python中著名的requests库☆14Apr 19, 2024Updated last year
- MPLS network implementations using FRRouting☆16Apr 17, 2022Updated 3 years ago
- Google Client Implementation in Scapy☆14Jun 26, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/dsocks☆14Aug 1, 2015Updated 10 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- The given information of network connection, model predicts if connection has some intrusion or not. Binary classification for good and b…☆11Aug 10, 2019Updated 6 years ago
- ARP ping detector on local network☆15Feb 3, 2013Updated 13 years ago
- Autoencoder approach to detect attacks/intrusions in a network☆10Mar 25, 2023Updated 2 years ago
- Code for YouTube videos on Networks☆10Apr 13, 2020Updated 5 years ago
- 阿里智能运维算法大赛 复赛14名方案☆12Oct 15, 2024Updated last year
- Python bindings to babeljs☆11Mar 16, 2018Updated 7 years ago
- fast-scanner can make it easy for you to develop scanners☆12Jun 8, 2020Updated 5 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- ☆11Oct 3, 2021Updated 4 years ago