Showing 99 open source projects for "aide intrusion detection"

View related business solutions
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • Manage your IT department more effectively Icon
    Manage your IT department more effectively

    Streamline your business from end to end with ConnectWise PSA

    ConnectWise PSA (formerly Manage) allows you to stop working in separate systems, and helps you build a more profitable business. No more duplicate data entries, inefficient employees, manual invoices, and the inability to accurately track client service issues. Get a behind the scenes look into the award-winning PSA that automates processes for each area of business: sales, help desk, support, finance, and HR.
  • 1
    devialog is a behavior/anomaly-based syslog intrusion detection system which detects unknown attacks via anomalies in syslog. It can generate signatures for ease of management, act upon anomalies in a predefined fashion or perform as a standard log parser
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Trinux is a small ramdisk/floppy based Linux distribution that contains useful tools for mapping and monitoring TCP/IP networks (i.e. intrusion detection and vulnerability scanning)
    Downloads: 14 This Week
    Last Update:
    See Project
  • 3
    GNUWire is a centrally managed, multi threaded file integrity checker / intrusion detection tool. It was written from the ground up with security, portability, scalability, performance and user interface in mind.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PyIDS is an intrusion detection system whose aim is to provide concise information to administrators about some parts of the system i.e filesystem checksums, unknown connections to the machine, access control lists of special files, log revision...
    Downloads: 0 This Week
    Last Update:
    See Project
  • A CRM and Sales Data Management Platform for Multi-Line Sales Teams Icon
    A CRM and Sales Data Management Platform for Multi-Line Sales Teams

    The CRM, sales reporting, and commission tracking tool uniquely tailored to the needs of manufacturers, sales reps, and distributors.

    Repfabric is a customer relationship management (CRM) software designed specifically for multi-line sales teams (i.e. reps, distributors, wholesalers, dealers, and manufacturers). It streamlines and simplifies the sales process by providing deep integration with email, contacts, calendars, and deal tracking. The platform enables users to track commissions from CRM to sale, make updates directly from mobile devices, and document sales calls using voice-to-text features.
  • 5
    Secwatch is an intrusion detection system using log analysis to detect service scan and other brute-force attempts on a server or other computer using system logs and will create temporary firewall rules to block offending IPs
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    EIS is an Intrusion detection system that gathers local "client" accounting information, compares it to known vulnerabilities and notifies the appropriate people when there is a comprimise in security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The Bro Re-usable Architecture (BRA) is a project by Christopher Jay Manders that will allow one, with minimal effort, to set up a working Bro (real-time intrusion detection) environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Ida, is a Apache log security analyzer written in PHP. It will scan Apache logs and report about security incidents like SQL injections, XSS attacks, path traveling and so on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    PSeudo terminal Intrusion Detection System. The kernel part plugs into terminal processing subsystem and logs hashed terminal lines. The user part reads these, consults a list of allowed entries, and takes appropriate action upon unexpected lines.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Innovate faster with enterprise-ready generative AI—enhanced by Gemini Icon
    Innovate faster with enterprise-ready generative AI—enhanced by Gemini

    Build, deploy, and scale machine learning (ML) models faster, with fully managed ML tools for any use case.

    Vertex AI offers everything you need to build and use generative AI—from AI solutions, to Search and Conversation, to 130+ foundation models, to a unified AI platform.
  • 10
    wIDSard is an host based Intrusion Detection System. It intercepts syscalls made by the process to monitor at user level by the ptrace mechanism. It can detect not only single system calls, but even sequences, ripetition, negation ecc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    User-friendly PHP frontend for the Prelude IDS database. Allows efficient processing of Prelude Intrusion Detection System reports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Free intrusion detection and network management system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    InSecT - Invincible Security Technology - an intelligent firewall and intrusion detection system
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    M-ICE is a modular hostbased intrusion detection framework. It is used as middleware to close the gap between IDS research and IDS development. M-ICE consists of various parts that can be connected together by using network-or interprocess-communication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Development of Linux kernel extensions which enable intrusion detection and prevention functionalities based on NSA's SELinux (http://www.nsa.gov/selinux/).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    HenWen is a network security package for Mac OS X that makes it easy to configure and run Snort, a free Network Intrusion Detection System. HenWen’s goal is to simplify setting up and maintaining software that scans the network for undesirable traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Easy integrity check system is easy to install and use file integrity system. Primarily ment for system administrators to aid in intrusion detection.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 19
    IDSRG stands for "Intrusion Detection System Report Generator". It generates graphic reports from a snort database of alerts. The main goal of the project is to provide instant reports of your ids events. It has 7 predefined reports and the plans are t
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The Intrusion Detection Exchange Protocol (IDXP) is an application-layer protocol for exchanging data between intrusion detection entities. IDXP-Java is a Java-based implementation based upon the Java BEEP Core implementation of RFC 3080 / RFC 3081.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Patron is a kernel based intrusion detection system. It rates a behavior of each OS process by counting its risk level according to a set of tests.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    “garuda” is an intrusion detection system against wireless threats. It is a progressive proof of concept project to ward off wireless threats such as war-drivers, rogue AP, wifi DoS and MAC spoofing attacks. Please enjoy and we welcome your volunteerism.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    Output spool reader for Snort! This program decouples output overhead from the Snort network intrusion detection system and allows Snort to run at full speed. It takes input and output plugins and can therefore be used to convert almost any spooled fil
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25
    OpenAanval - The Open Source version of the Commercial Aanval Console - A full featured advanced Intrusion Detection System (IDS) Console for Snort. Real-time LIVE event monitoring, comprehensive statistics, multi-user, email / audio alerting, IP marking
    Downloads: 0 This Week
    Last Update:
    See Project