Category: Defense

Suricata

Suricata: network IDS, IPS and NSM engine

What is Suricata The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry but...

prads

prads: Passive Real-time Asset Detection System

prads: Passive Real-time Asset Detection System Is a `Passive Real-time Asset Detection System`. It passively listens to network traffic and gathers information on hosts and services it sees on the network. This information can be used...

PiDense

PiDense: Monitor illegal wireless network activities

PiDense Purpose Monitor illegal wireless network activities. Similar SSID broadcasts Detects SSID brute Detects beacon flood Monitor deauthentication attack Same SSID broadcasts Calculates unencrypted wireless networks density Watches SSID broadcasts at the blacklist. KARMA Attacks...

wazuh

wazuh: Host and endpoint security

Wazuh Wazuh helps you to gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and application level. This solution, based on lightweight multi-platform agents, provides the following capabilities: Log...

raptor waf

Raptor WAF v0.5 releases: Web application firewall

raptor waf Raptor is a Web application firewall made in C, uses DFA to block SQL injection, Cross site scripting and path traversal. Why is this tool made in C language? C has a...

AIEngine

Artificial Intelligent Engine (AIEngine) v1.9.0 release: packet inspection engine

AIEngine is a next-generation interactive/programmable Python/Ruby/Java/Lua and Go network intrusion detection system engine with capabilities of learning without any human intervention, DNS domain classification, Spam detection, network collector, network forensics and many others. AIEngine...

SSH password cracking

Preventing SSH password cracking

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.The best known example application is for remote login to computer systems by users. SSH provides a secure...

pulledpork

pulledpork: Snort and Suricata rule management

pulledpork PulledPork for Snort and Suricata rule management (from Google code) Features and Capabilities Automated downloading, parsing, state modification and rule modification for all of your snort rulesets. Checksum verification for all major rule...