rfxn / advanced-policy-firewallView external linksLinks
Advanced Policy Firewall (APF)
☆99Updated this week
Alternatives and similar repositories for advanced-policy-firewall
Users that are interested in advanced-policy-firewall are comparing it to the libraries listed below
Sorting:
- Brute Force Detection (BFD)☆25Aug 10, 2014Updated 11 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- ☆26Mar 6, 2025Updated 11 months ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Nov 24, 2014Updated 11 years ago
- Linux Malware Detection (LMD)☆1,368Feb 26, 2025Updated 11 months ago
- Dns (Bind) Log Analyzer☆19Apr 16, 2019Updated 6 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- A fully featured malware scanner for Linux desktops and servers.☆69May 18, 2022Updated 3 years ago
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 9 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Simple PowerShell script to quickly add Windows Firewall Rules☆18Sep 14, 2017Updated 8 years ago
- Capturing, analysing and responding to cyber attacks☆172Sep 13, 2024Updated last year
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- Easily manage CloudFlare's free features including purge proxy cache (CDN) and enable dev mode, with Dashboard widgets for DNS Records an…☆16May 19, 2019Updated 6 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Nov 16, 2023Updated 2 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- A Puppet module to manage DirectAdmin and Custombuild.☆13Mar 6, 2020Updated 5 years ago
- [DEPRECATED] — OVHcloud Control Panel Dedicated UI — Official Repository☆13Jan 29, 2020Updated 6 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 10 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Nov 3, 2024Updated last year
- An utility to query and change NVRAM contents from the command line.☆19May 10, 2016Updated 9 years ago
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- Lint and validate Apache2 Htaccess files☆17Mar 5, 2021Updated 4 years ago
- Passive Network Audit Framework☆32May 17, 2018Updated 7 years ago
- Files associated with various network performance projects☆35Mar 23, 2019Updated 6 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- Simple (web-) application vulnerability management system☆21Aug 14, 2014Updated 11 years ago
- Open source entropy based invalid traffic detection and pre-bid filtering.☆71Sep 6, 2019Updated 6 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- A pam module to send warnings when certain 'fake' passwords are used to login☆15Jun 12, 2019Updated 6 years ago
- Bash functions to help when auditing cpanel servers☆26Nov 15, 2013Updated 12 years ago
- Build a basic OpenBSD firewall with Ansible☆20Apr 17, 2025Updated 9 months ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Scripts to deliver apache/php log files to graylog2☆36Jun 4, 2016Updated 9 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago