Attack Detection
☆1,360Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for AttackDetection
Users that are interested in AttackDetection are comparing it to the libraries listed below
Sorting:
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,267Jul 8, 2023Updated 2 years ago
- AD Security Intrusion Detection System☆1,322Mar 31, 2023Updated 2 years ago
- Elkeid is an open source solution that can meet the security requirements of various workloads such as hosts, containers and K8s, and ser…☆2,606Mar 9, 2026Updated last week
- QNSM is network security monitoring framework based on DPDK.☆527Sep 27, 2021Updated 4 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment)☆3,785Oct 27, 2020Updated 5 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆675Dec 23, 2025Updated 2 months ago
- 本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。☆2,808Aug 7, 2022Updated 3 years ago
- Source Code Security Audit (源代码安全审计)☆3,190Sep 16, 2022Updated 3 years ago
- By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.☆602Apr 1, 2021Updated 4 years ago
- 常见的攻击行为监测特征及方法,涵盖端点和流量,未包含PowerShell和Sysmon。预祝运营生活愉快!☆645Jan 18, 2026Updated 2 months ago
- Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OIS…☆6,063Mar 10, 2026Updated last week
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- 被动式漏洞扫描系统☆873Nov 1, 2017Updated 8 years ago
- 各种漏洞poc、Exp的收集或编写☆2,490Jun 24, 2025Updated 8 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆511Mar 13, 2026Updated last week
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆866Jul 21, 2019Updated 6 years ago
- Windows Events Attack Samples☆2,526Jan 24, 2023Updated 3 years ago
- Suricata rules for network anomaly detection☆183Feb 7, 2026Updated last month
- 巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。☆3,595Apr 16, 2024Updated last year
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆964Feb 28, 2026Updated 3 weeks ago
- 红队基础设施自动化部署工具☆853Jan 4, 2023Updated 3 years ago
- Suricata安装部署&丢包优化&性能调优&规则调整&Pfring设置☆143Oct 14, 2019Updated 6 years ago
- Open-Source Security Architecture | 开源安全架构☆943May 10, 2021Updated 4 years ago
- Vulnerability Labs for security analysis☆1,170Mar 10, 2021Updated 5 years ago
- A collection of pentest and development tips☆1,126May 26, 2022Updated 3 years ago
- HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis an…☆748Apr 7, 2023Updated 2 years ago
- ✍️ A curated list of CVE PoCs.☆3,483Jan 4, 2022Updated 4 years ago
- 红队作战中比较常遇到的一些重点系统漏洞整理。☆2,521Jul 17, 2021Updated 4 years ago
- Python2编写的struts2漏洞全版本检测和利用工具☆1,418May 7, 2019Updated 6 years ago
- GitHub 泄露监控系统(GitHub Sensitive Information Leakage Monitor Spider)☆2,034May 21, 2022Updated 3 years ago
- Utilities for Sysmon☆1,576Sep 21, 2025Updated 6 months ago
- BCS(北京网络安全大会)2019 红队行动会议重点内容☆819Sep 4, 2019Updated 6 years ago
- a webshell resides in the memory of java web server☆700Jun 26, 2018Updated 7 years ago
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated last week
- 更快速的进行Web应用指纹识别☆171May 9, 2019Updated 6 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,722Sep 23, 2025Updated 5 months ago
- SQL / SQLI tokenizer parser analyzer☆1,028Oct 4, 2023Updated 2 years ago
- Nmap&Zmap特征识别,绕过IDS探测☆329Aug 1, 2019Updated 6 years ago
- [archived] 一款实验性质的主机入侵检测系统☆2,190Jun 29, 2020Updated 5 years ago