Brute force attack detection with exponential-decay pressure scoring, 42 service rules, 8 firewall backends, IPv4/IPv6, and repeat-offender escalation
☆26Mar 3, 2026Updated this week
Alternatives and similar repositories for brute-force-detection
Users that are interested in brute-force-detection are comparing it to the libraries listed below
Sorting:
- TorrentFinder.sh is a "simple" bash script that uses wget, grep, etc. to list the top 5 torrents found on each of the 8 sites based on th…☆12Feb 4, 2018Updated 8 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- SSH into all local Docker containers by name.☆84May 13, 2014Updated 11 years ago
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 3 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- ModSecurity status☆33May 27, 2014Updated 11 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Jul 7, 2021Updated 4 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆130Jan 28, 2018Updated 8 years ago
- ☆16Oct 3, 2025Updated 5 months ago
- OSINT tool to evaluate the trustworthiness of a company☆41Dec 7, 2019Updated 6 years ago
- Tools for encryption, decryption and cracking from several cryptographic systems.☆40Feb 22, 2023Updated 3 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- AlienVault Open Threat Exchange App For Splunk☆10May 6, 2014Updated 11 years ago
- My NaNoGenMo 2014 project: a generative detective comic☆16Nov 22, 2014Updated 11 years ago
- A robot powered training repository☆10Feb 19, 2026Updated 2 weeks ago
- ☆11Jul 10, 2019Updated 6 years ago
- Remove NotebookLM watermarks from slides. Local processing, no upload needed.☆37Jan 15, 2026Updated last month
- A new version of the automatic pokemon game☆10May 11, 2020Updated 5 years ago
- ☆10Mar 17, 2019Updated 6 years ago
- Learn How to Program iPhone Apps☆19Oct 8, 2013Updated 12 years ago
- Useful scripts that I create in my free time to benefit the open source community.☆12Dec 14, 2019Updated 6 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- Automate scans using Qualys SSL Labs☆19Mar 10, 2020Updated 5 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Automate Lynis Fixes☆10Jan 8, 2018Updated 8 years ago
- w3act is an annotation and curation tool for building web archive collections☆21Jan 30, 2024Updated 2 years ago
- This iOS 9 app lets you use your own filter list in Safari.☆11Sep 5, 2015Updated 10 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago