stratosphereips / AIVPN
The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.
☆82Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for AIVPN
- The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.☆32Updated last week
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 6 months ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆68Updated last month
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆14Updated 2 years ago
- the IoT and OT (Operational Technology) Honeypot☆20Updated 8 months ago
- Maltego integration of https://clearbit.com☆35Updated 4 years ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆58Updated 4 years ago
- 🚀 A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.☆20Updated this week
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆36Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆49Updated last month
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆54Updated 5 months ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆86Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆136Updated 11 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆68Updated last month
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆63Updated last year
- For Public Objects☆19Updated 3 weeks ago
- Index and collection of MVT compatibile indicators of compromise.☆65Updated 6 months ago
- The Security Analyst’s Guide to Suricata☆52Updated 5 months ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆63Updated 5 months ago
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆60Updated last week
- URL fingerprinting made easy☆79Updated 7 months ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆16Updated 8 months ago
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆167Updated 6 months ago
- ☆44Updated 6 years ago
- A database for storing, querying and doing stats on credential leaks☆38Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- Google Chrome forensic tool to process, analyze and visualize browsing artifacts☆111Updated 2 weeks ago
- OpenCTI datasets☆23Updated 8 months ago
- 🔍 Discover if a domain is resolvable or blocked by secure DNS and Ad-blocking services, and experience the innovative idea of DaaS - DNS…☆71Updated 6 months ago