Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
watches for Regristry-changes of keys like HKLMSoftwareMicrosoftWindowsCurrentVersionRun etc. and pops up if something has changed, logs it, can ask google for the key found. Protects against Trojans and Viruses.
A tool to monitor internet hosts` bandwidth usage in a Linux-NAT network. A daemon collects data and clients display them (currently a Java applet with a graph). It automatically detects new hosts and has a nice summary statistic.
TILT is a set of terminal logging and playback tools for auditing telnet and SSH connections made from a bastion host. It provides timestamped logs and real time playback of logs for incident reports, incident analysis or as a training aid
Labrador is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in Perl. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.
Strokey is a small hardware keyboard logger saving all keystrokes into an EEPROM memory for later investigation. The device may get attached to any PS/2-keyboard by intercepting the cable, or get placed directly inside for maximum invisibility.
alerttail tails a file and triggers events based on regex matching. Notify (libnotify), sys command, filtering and geoip localization actions are provided. Highly configurable via config file.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Nuhe Client is a project related to the Nuhe Action Capable Log Monitor. This GUI client simplifies the administration of sensors and node managers, making it easier to control and monitor the network. Comes with a rule editor as well as a log monitor.
ccsrch is a tool that searches for and identifies unencrypted and contiguous credit card numbers (PAN) and track data on windows and UNIX operating systems. It will also identify the location of the PAN data in the files and record MAC times.
augrok is a Linux audit log analysis tool written in Perl that provides searches based on real and effective user/group ids along with login id, executable name, terminal, within a time range, regular expression matching, and so much more.
Changetrack logs modifications of a set of files, and allows recovery of the tracked files from any stage of development. The changes are presented in a powerful web-based form, a text file, or an email message. A handful of options allow situation-specif
An ARP watch daemon for windows (portable to linux but it is already there...) which is able to be run as a service and logs to eventlog so one can collect the logs and react to events.
The High Interaction Honeypot Analysis Toolkit (HIHAT) allows to transform arbitrary PHP applications into a web-based Honeypot. A semi-automatic user interface supports the analysis process, scans for attacks etc.
devialog is a behavior/anomaly-based syslog intrusion detection system which detects unknown attacks via anomalies in syslog. It can generate signatures for ease of management, act upon anomalies in a predefined fashion or perform as a standard log parser
ettercap-gg is a Gadu-Gadu IM ettercap dissector. It is a patch for ettercap sniffer that adds the ability to sniff Gadu-Gadu logins, passwords and messages. Gadu-Gadu (www.gadu-gadu.pl/) is the most widely used IM network in Poland with ~6mln users.
A framework for information security management. It has the centralized server for managing the IDS sensors, log consolidation and correlation, report generation etc. Also it has customized IDS sensor based on snort.
Scour: a Perl script able to find lines in log files matching a given Perl regular expression. It counts matches within given time periods, and reports on whether the number of matches exceeds a given count, shows matching lines, or executes a command.
SAWS is a Secure Audit Service that cryptographically protects all log messages. It can run as either a standalone web service called SAWS (Secure Audit Web Service) or as a Java Secure Audit Trail Service (JSATS) that is called via a Java API.
What are the packets rejected by your Netfilter based firewall today ? How often this suspicious host try to connect to your box ? What are the most rejected domains ? Who is this strange host which scan your ports ?
The responses are in the iptables log
PIX Logging Architecture correlates Cisco PIX system logs into a MySQL database and provides a web-based frontend for displaying, searching, and managing Cisco PIX logged events, traffic, and IDS logs (More info at http://www.logging-architecture.net ).
PyIDS is an intrusion detection system whose aim is to provide concise information to administrators about some parts of the system i.e filesystem checksums, unknown connections to the machine, access control lists of special files, log revision...