Showing 217 open source projects for "intrusion"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • 1
    AIDE - Advanced Intrusion Detection Environment
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Polluted gases Estimator

    Create, estimate and analyses gas pollutants and the possible costs

    ..., which results in packaged CO2 or any other gases, without worrying about gas dilution and intrusion processes which more complicated and costly also are not well investigated, that is a setback for many CO2 technology. The SPS technology consists of single device called Gas Purification machine. The design of Gas Purification system do not allow the conventional filtration of the gases instead let particulates and molecules to try and find the way out with specific pressure and resistances.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    AlienVault OSSIM

    AlienVault OSSIM

    Open Source SIEM

    OSSIM, AlienVault’s Open Source Security Information and Event Management (SIEM) product, provides event collection, normalization and correlation. For more advanced functionality, AlienVault Unified Security Management (USM) builds on OSSIM with these additional capabilities: * Log management * Advanced threat detection with a continuously updated library of pre-built correlation rules * Actionable threat intelligence updates from AlienVault Labs Security Research Team * Rich...
    Downloads: 87 This Week
    Last Update:
    See Project
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 5
    Virtual eXecuting Environment
    VXE (Virtual eXecuting Environment) is an Intrusion Prevention System (IPS). It protects Linux servers from hacker attacks from network, etc. It protects software subsystems, such as: SMTP, HTTP and any other subsystem, already installed at the server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Dens PC

    Dens PC

    Periodontal and Dental charting - All in one

    .... Fracture 16. Furcation 17. Hypoplasia 18. Intrusion 19. Mesial movement 20. Missing tooth 21. Mobility 22. Odontomy 23. Overhanging crown margins 24. Overhanging filling margins 25. Periapical abscess 26. Post&Core 27. Radix 28. Recession on pocket 29. Root canal filling 30. Sensitivity 31. Suppuration on probing 32. Telescopic crown 33. Veener
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    jfail2ban

    java alternative to Fail2ban

    The goal of jfail2ban is to provide platform independent intrusion detection similar to Fail2ban.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Snort
    ** As of Snort 2.9.7.6, we are longer releasing Snort on SourceForge. Please head to http://www.snort.org from now on!** **As of June 2017, the mailing lists are no longer on SourceForge, and have moved to https://lists.snort.org** Snort is a libpcap-based sniffer/logger which can be used as a network intrusion detection and prevention system. It uses a rule-based detection language as well as various other detection mechanisms and is highly extensible.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 9
    Untangle
    Untangle is a Linux-based network gateway with pluggable modules for network applications like spam blocking, web filtering, anti-virus, anti-spyware, intrusion prevention, bandwidth control, captive portal, VPN, firewall, and more. Visit http://untangle.com
    Downloads: 11 This Week
    Last Update:
    See Project
  • Start building the next generation of GenAI apps today Icon
    Start building the next generation of GenAI apps today

    MongoDB and Google Cloud bring together powerful technologies that enable you to confidently build GenAI experiences.

    MongoDB Atlas is a fully-managed developer data platform built by developers, for developers. With tight integration to Google Cloud services such as Vertex AI and BigQuery, you can accelerate application deployment to stay at the forefront of AI innovation.
    Learn More
  • 10

    smartIDS

    Lightweight intrusion detection for IoT and embedded devices.

    The aim of the project is a lightweight intrusion detection library for embedded devices which supports MSP430 and ARM Cortex based devices. Features include DSP/SIMD support, IoT and embedded protocols, distributed operation, event and history management, tool supported configuration and visualization. There is a Java port that supports less features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Snort add-on is a network intrusion detection system for ipcop version 2. Last version of IPCOP version 2.1.9 n.b: Snort add-on needs 700 Mo minimum free space disk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Mock.js

    Mock.js

    A simulation data generator

    Mock.js is a simulation data generator to help the front-end to develop and prototype separate from the back-end progress and reduce some monotony particularly while writing automated tests. Generate random data and intercept Ajax requests. Let the front-end siege division develop independently of the back-end. Through random data, various scenarios are simulated. Without modifying the existing code, you can intercept Ajax requests and return simulated response data. An intuitive interface....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Security Onion

    IDS/NSM, Snort, Suricata, Bro, Sguil, Squert, ELSA, Xplico

    Security Onion is a Linux distro for IDS (Intrusion Detection) and NSM (Network Security Monitoring). It's based on Ubuntu and contains Snort, Suricata, Bro, Sguil, Squert, ELSA, Xplico, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
    Downloads: 48 This Week
    Last Update:
    See Project
  • 14

    RHIPS

    Rhythm Host Intrusion Prevent System is a log file monitor IDS/IPS

    Rhythm Host Intrusion Prevention System is a log file monitor IDS/IPS for Windows. RHIPS can alert you via email when it matches detection criteria or execute a custom command. For alerting and response specify the number of instances before alerting or taking action. If specifying a command action another command can be run later on a timed basis. Port to IP address correlation allows for the connecting IP address to be identified and action taken against it.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    pytbull
    ============ ***IMPORTANT*** PLEASE NOTE THAT PYTBULL IS NO LONGER MAINTAINED AND HAS BEEN PORTED BY netrunn3r HERE: https://github.com/netrunn3r/pytbull-ng. YOU SHOULD USE pytbull-ng INSTEAD. THANK YOU. ============ pytbull is an Intrusion Detection/Prevention System (IDS/IPS) Testing Framework for Snort, Suricata and any IDS/IPS that generates an alert file. It can be used to test the detection and blocking capabilities of an IDS/IPS and to validate config.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16

    smartsbc

    Smart Session Border Controller

    ...: a) Realtime Log file mining module. This subservice module is responsible to analize certain patterns reported in log files in order to detect possible intrusion threats. You can configure your own pattern in your own lof file in order to trigger alerts or take actions. b) Schedule module. This subservice module is responsible to trigger certain action based on cron strategies. c) Plugin module.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Intrusion Detection and Defense System

    Intrusion Detection and Defense System for windows

    Its a light weight Intrusion detection and defense system works with windows firewall to protect any windows operating system from attacks that are intended to hack the server or provide any operational damage. By keeping eye on network activities and event viewer logs, ServerCloak capture and log any failed/denied inbound calls from IPv4 as well as IPv6. Once the calls reaches its limit, the service immediately tells windows firewall to block the attacking IP by adding a denial inbound...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    SSHCure

    Flow-based SSH Intrusion Detection System

    We have just released SSHCure 3.0, which is available in our new repository at GitHub: https://github.com/sshcure/sshcure/. SSHCure is an intrusion detection system (IDS) that has been designed as a plugin for NfSen (http://nfsen.sourceforge.net). It detects and analyzes SSH intrusion attempts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    fkwacid

    application specific intrusion detection

    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    RHAPIS

    RHAPIS

    NIDS Simulator

    RHAPIS is a network intrusion detection systems simulator through which you can make, detect and analyze threats virtually.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Nfsight is a Netflow processing and visualization application designed to offer a comprehensive network awareness solution. It is developed as a Nfsen plugin to provide client/server identification and intrusion detection capabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    HostIPstats

    Collect and display host IP traffic statistics

    This tool provides IP traffic information at a level between a simple traffic counter (e.g. darkstat) and full packet capture or intrusion detection. It collects packet and byte counts by host IP address, protocol, and port. The next phase of the project is to analyze and display this data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Clam sentinel is a program that detects file system changes and automatically scans the files added or modified using ClamWin. Require the installation of ClamWin. For Microsoft Windows 98/98SE/Me/2000/XP/Vista, Windows 7 and Windows 8.1.
    Leader badge
    Downloads: 140 This Week
    Last Update:
    See Project
  • 24
    Author Intrusion

    Author Intrusion

    An integrated writing environment inspired by Visual Studio.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Network Signature Manager (N.S.M) Lite

    Network Signature Manager (N.S.M) Lite

    Manage your Snort rules with N.S.M.

    N.S.M Lite is a simple and easy way to manage your signatures for your Snort based IDS/IPS implementation, which can improve IDS/IPS signature development for accurate detection of malicious malware. Additionally, N.S.M can be used a learning tool to help you understand the complex nature of Intrusion Detection and/or Prevention (IDP) signatures for the Snort platform.
    Downloads: 0 This Week
    Last Update:
    See Project