Search Results for "intrusion detection system code"

Showing 2 open source projects for "intrusion detection system code"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    ESU Assist for Windows 10

    ESU Assist for Windows 10

    Tool for checking Windows 10 ESU eligibility and managing enrolment

    ESU Assist for Windows 10 (Latest v1.2.1 — 30/09/2025) ESU Assist is a freeware utility that helps administrators detect ESU eligibility, automate forced enrolment into Microsoft's Extended Security Updates for Windows 10, and safely restore original settings when needed, using enhanced rollback features. 🗂️ Download ESU Assist 1.2.1 ZIP: https://www.liberategrace.com/apps/esu-assist/ESU_Assist_1.2.1.zip 🧩 Source Code:...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    PowerSploit PowerShell

    PowerSploit PowerShell

    A PowerShell Post-Exploitation Framework

    PowerSploit is a collection of PowerShell modules that historically served as a toolkit for post-exploitation tasks, red-team exercises, and offensive-security research—covering areas like reconnaissance, lateral movement, persistence, and situational awareness. The repository bundles many focused scripts: code to enumerate system and Active Directory information, payload generation helpers, in-memory execution utilities, and modules to interact with credentials and services. Because the modules can be used to both demonstrate weaknesses and to exploit them, the project is typically referenced in threat emulation, penetration testing, and defensive research to understand attacker capabilities. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB