CoreDNS plugin exposing Prometheus metrics for malicious or prohibited requests
-
Updated
Jun 17, 2024 - Go
CoreDNS plugin exposing Prometheus metrics for malicious or prohibited requests
🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
🚀 A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
A utility to safely generate malicious network traffic patterns and evaluate controls.
fast, extensible, versatile event router for Suricata's EVE-JSON format
Real-time HTTP Intrusion Detection
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
A lightweight tool to score network traffic and flag anomalies
802.11 IDS, visualizer, and analytics platform for the web
Super fast Go server for intrusion detection and prevention on Apache logs
automatic enumeration and maintenance of Suricata monitoring interfaces
proof of concept intrusion mitigation tool written in go for windows. (Sysmon eventlogs and Sigma .yml signature rules)
Add a description, image, and links to the intrusion-detection topic page so that developers can more easily learn about it.
To associate your repository with the intrusion-detection topic, visit your repo's landing page and select "manage topics."