Showing 6 open source projects for "intrusion"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1

    FTimes

    A forensic system baselining, searching, and evidence collection tool

    FTimes is a forensic system baselining, searching, and evidence collection tool. Its primary purpose is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to intrusion and forensic analysis.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    Neighbor-based IDS for TinyOS
    Our IDS monitors the presence of selective forwarding, jamming and hello flood attacks and employs the neighbor-based detection technique. The IDS works on TinyOS running the CTP. The IDS agents operate as standalone, 1 or 2-hop collaborating units.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This is a highly configurable and flexible testing tool capable of generating different streams of network packets based on set of parameters user provides, for performance & robustness testing on a NIDS - Network Intrusion detection System.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    M-ICE is a modular hostbased intrusion detection framework. It is used as middleware to close the gap between IDS research and IDS development. M-ICE consists of various parts that can be connected together by using network-or interprocess-communication
    Downloads: 0 This Week
    Last Update:
    See Project
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
    Learn More
  • 5
    The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    “garuda” is an intrusion detection system against wireless threats. It is a progressive proof of concept project to ward off wireless threats such as war-drivers, rogue AP, wifi DoS and MAC spoofing attacks. Please enjoy and we welcome your volunteerism.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next