Search Results for "network anomaly detection"

142 programs for "network anomaly detection" with 1 filter applied:

  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    Shennina

    Shennina

    Automating Host Exploitation with AI

    Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial Intelligence. Shennina is integrated with Metasploit and Nmap for performing the attacks, as well as being integrated with an in-house Command-and-Control Server for exfiltrating data from compromised machines automatically. Shennina scans a set of input targets for available network services, uses its AI engine...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server implements multiple spam filters

    The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Files' to download the professional version 2.8.1 build 24261. A linux(ubuntu 20.04 LTS) and a freeBSD 12.2 based ready to run OVA of ASSP V2 are...
    Leader badge
    Downloads: 53,212 This Week
    Last Update:
    See Project
  • 3
    Smb4K

    Smb4K

    Advanced Network Neighborhood Browser and Samba Share Mounting Utility

    Smb4K is an advanced network neighborhood browser and Samba share mounting utility. It is based on the KDE Frameworks 5 and Samba's client library (libsmbclient). It scans your network neighborhood for all available workgroups, servers and shares and can mount all desired shares to your local file system. It is released under the terms of the GNU General Public License, version 2 (GPL v2+). Linux, FreeBSD and its derivatives e. g. GhostBSD and TrueOS), NetBSD and DragonFly BSD are officially...
    Leader badge
    Downloads: 133 This Week
    Last Update:
    See Project
  • 4
    Java Service Wrapper
    Configurable tool which allows Java applications to be installed and controlled like native NT or Unix services. Includes fault correction software to automatically restart crashed or frozen JVMs. Critical when app is needed 24x7. Built for flexibility.
    Leader badge
    Downloads: 18 This Week
    Last Update:
    See Project
  • ConnectWise Cybersecurity Management for MSPs Icon
    ConnectWise Cybersecurity Management for MSPs

    Software and support solutions to protect your clients’ critical business assets

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
    Learn More
  • 5
    Simple Event Correlator (SEC) is a lightweight event correlator for network management, log file monitoring, security management, fraud detection, and other tasks which involve event correlation.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 6
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    ... to run the exploit to simulate a real-world attack that will be used to determine corporate resilience across the network. When running an exploit, it will practice the organization's cyber event management, which doesn't happen when scanning for cluster issues. It can help the organization learn how to operate when real attacks happen, see if its other detection system works as expected and what changes should be made.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Zenoss Community Edition

    Zenoss Community Edition

    Zenoss - Intelligent IT Operations Management

    Zenoss provides software-defined IT operations for the world’s largest organizations. We deliver the ultimate level of IT service health with simplicity by providing the most granular and intelligent IT service modeling possible, at any scale, and sharing these unique insights with other IT operations management (ITOM) tools to make them more efficient. Zenoss Community Edition is not a “demo” or trial version of Zenoss Enterprise or Zenoss Cloud! Before You install Zenoss Community...
    Downloads: 46 This Week
    Last Update:
    See Project
  • 8
    CUPS back-end for the canon printers using the proprietary USB over IP BJNP protocol. This back-end allows Cups to print over the network to a Canon printer. The design is based on reverse engineering of the protocol. Version 2.0 adds ink-level reporting and improved out-of-paper detection. Version 2.0.1 is now released under GPLv2 or later to be compatible with the changed cups license. No other changes. Version 2.0.2 fixes a compile error with GCC9 Version 2.0.3 Fix GCC10 compile...
    Leader badge
    Downloads: 81 This Week
    Last Update:
    See Project
  • 9
    Why Can't I Connect?

    Why Can't I Connect?

    Makes it easier to resolve TCP/IP connection errors.

    "Why Can't I Connect?" makes it easier to resolve TCP/IP connection errors. Use it to diagnose connections to common server types and create generic clients and / or servers. A source tar, a 32 bit and 64 bit rpm, a 32 bit, 64 bit, and Raspbian / armhf deb, and a 32 bit Windows install exe are available. The 32 bit Windows executable runs fine in 64 bit Windows systems. Go to: https://www.whycanticonnect.com/?q=instructions for help / instructions. Go to:...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Boost your bottom line in less time | IBM Cognos Analytics Icon
    Boost your bottom line in less time | IBM Cognos Analytics

    Business intelligence solution for businesses wanting to make better analytics and confident decisions

    IBM Cognos Analytics acts as your trusted co-pilot for business with the aim of making you smarter, faster, and more confident in your data-driven decisions.
    Learn More
  • 10
    Coppermine Photo Gallery
    Coppermine is an easily set-up, fast, feature-rich photo gallery script with mySQL database, user management, private galleries, automatic thumbnail creation, ecard feature and a template system for easy customization to match the rest of a site.
    Downloads: 88 This Week
    Last Update:
    See Project
  • 11
    AIDE - Advanced Intrusion Detection Environment
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    JPPF

    JPPF

    The open source grid computing solution

    JPPF makes it easy to parallelize computationally intensive tasks and execute them on a Grid.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 13
    TimeCollect
    TimeCollect records time you spent on your development work. Core features are: Automatic uptime monitoring, recording a break with one click, Trac integration for fetching tickets you are working on, storage in Derby or external MySQL database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    JMEDS (Java Multi Edition DPWS Stack)

    JMEDS (Java Multi Edition DPWS Stack)

    JMEDS is a lightweight, modular extendable Java Framework for DPWS.

    JMEDS is a lightweight, modular and extendable software framework for using the "Devices Profile for Web-Services (DPWS)" in Java based environments. It runs on Java CLDC (e.g. on embedded devices), CDC, Android and SE platforms. 12.02.2014 v2.0.0 beta 10 fixed the EXI release and included schema files for EXI's schema informed mode, multiple other bug fixes 25.09.2013 Bugfix release of JMEDS Framework: v2.0.0 beta 9a 30.08.2013 v2.0.0 beta 9 New version of JMEDS...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ( pro ping )pinger network alert monitor

    ( pro ping )pinger network alert monitor

    Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY

    Thank you for your DONATIONS for Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY. Look on the tab files, select and download the version of the operating system that you need of this slight textual code that requires no system update. Network monitoring analyzer, network scanner with ping, traceroute and beeper alert and warning mail sender. Capable of scanning IP INFINIT, automatic detection of the source of network interruptions without GUI interface configurations. More...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    DataCleaner

    DataCleaner

    Data quality analysis, profiling, cleansing, duplicate detection +more

    DataCleaner is a data quality analysis application and a solution platform for DQ solutions. It's core is a strong data profiling engine, which is extensible and thereby adds data cleansing, transformations, enrichment, deduplication, matching and merging. Website: http://datacleaner.github.io
    Leader badge
    Downloads: 79 This Week
    Last Update:
    See Project
  • 17
    AlienVault OSSIM

    AlienVault OSSIM

    Open Source SIEM

    OSSIM, AlienVault’s Open Source Security Information and Event Management (SIEM) product, provides event collection, normalization and correlation. For more advanced functionality, AlienVault Unified Security Management (USM) builds on OSSIM with these additional capabilities: * Log management * Advanced threat detection with a continuously updated library of pre-built correlation rules * Actionable threat intelligence updates from AlienVault Labs Security Research Team * Rich analytics...
    Leader badge
    Downloads: 68 This Week
    Last Update:
    See Project
  • 18
    Snort
    ** As of Snort 2.9.7.6, we are longer releasing Snort on SourceForge. Please head to http://www.snort.org from now on!** **As of June 2017, the mailing lists are no longer on SourceForge, and have moved to https://lists.snort.org** Snort is a libpcap-based sniffer/logger which can be used as a network intrusion detection and prevention system. It uses a rule-based detection language as well as various other detection mechanisms and is highly extensible.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    NXLog

    NXLog

    A multi-platform universal log collector and forwarder

    NXLog is a modular, multi-threaded, high-performance log management solution with multi-platform support. In concept it is similar to syslog-ng or rsyslog but is not limited to unix/syslog only. It can collect logs from files in various formats, receive logs from the network remotely over UDP, TCP or TLS/SSL . It supports platform specific sources such as the Windows Eventlog, Linux kernel logs, Android logs, local syslog etc. Writing and reading logs to/from databases is also supported...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    asvn
    The Arc-live(X86-i386)is a distribution live dvd and pendrive with automatic hardware detection and is now included the kernel-3.2.0-4-486/3.2.0-4-686-pae(arc-live-1.0.1-wheezy stable with live-installer).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21
    Newscoop

    Newscoop

    The open content management system for news.

    The open content management system for professional journalists. Features include multiple author management, issue-and-section based publishing, geolocation, multilingual content management, and a templating engine supporting HTML5 & mobile.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    New Terrain and 3D Map System

    New Terrain and 3D Map System

    a very lightweight advanced terrain-rendering and 3D map rendering sys

    A very lightweight advanced terrain-rendering and 3D map rendering system. Minimal dependencies: OpenGL, SDL. It's distrib in 2-3 separate modules: 1. the C++ implementation of the terrain- and/or surface- rendering Algorithms I have developed: both a multithread and a non-multithread variant is relaeased. 2. Seme as at point 1. , but with a road-network rendering and collision-detection module I wrote before. It also adds some trees at the top of the terrain. (multitread vesion...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    ilodids

    Incremental and local outlier detection

    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Wireless Universal Resource File

    Wireless Universal Resource File

    Handset Detection for Mobile Applications. Device Description Database

    WURFL lets you detect thousands of types of mobile devices accessing your web service and take decisions based on what that device can or cannot do. With WURFL, you can optimize mobile web content, effectively deliver advertisements, or analyze mobile traffic. WURFL will read HTTP requests from mobile browsers and search the Device Description Repository (DDR) for the corresponding device properties (i.e. capabilities). WURFL will return the device capabilities to your application, which...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    FaceAccess Facial Recognition System

    FaceAccess Facial Recognition System

    FaceAccess is an Access Control System based on Facial Recognition

    With the growing need to exchange information and share resources, information security has become more important than ever in both the public and private sectors. Although many technologies have been developed to control access to files or resources, to enforce security policies, and to audit network usages, there does not exist a technology that can verify that the user who is using the system is the same person who logged in. FaceAccess provides a prototype implementation as a "login...
    Downloads: 1 This Week
    Last Update:
    See Project