stratosphereips / AIVPNLinks
The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.
☆95Updated last year
Alternatives and similar repositories for AIVPN
Users that are interested in AIVPN are comparing it to the libraries listed below
Sorting:
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Updated 2 years ago
- CSI SIEM☆110Updated 3 years ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆88Updated 3 months ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆34Updated 9 years ago
- Scripts to deploy and update MISP in air-gapped environments☆17Updated 2 months ago
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆180Updated last year
- The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.☆32Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆134Updated this week
- Honeyscanner: A vulnerability analyzer for honeypots☆53Updated last week
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆104Updated 3 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆77Updated this week
- Index and collection of MVT compatibile indicators of compromise.☆117Updated 3 weeks ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago
- Sample programs to access the API☆97Updated last month
- Threat Intel Platform for T-POTs☆161Updated this week
- Maltego local and server integration for OpenCTI☆33Updated last year
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆69Updated 9 months ago
- Visualize networks of phishing by querying the phishstats.info API☆78Updated last year
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Updated 3 years ago
- Network Entity Reputation Database☆37Updated 2 months ago
- Maltego integration of https://clearbit.com☆42Updated 5 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆29Updated last year
- A Passive SSH back-end and scanner.☆104Updated 6 months ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆190Updated 3 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- packet captures of real-world ddos attacks☆165Updated 2 months ago
- Clone network interface from one host as a tap interface on another host☆61Updated 5 years ago
- Collection of tool you need to have in your Endpoint Detection and Response arsenal☆111Updated last year
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated 2 years ago