102 Open Source Ids Software Projects
Free and open source ids code projects including engines, APIs, generators, and tools.
Vinkla Hashids 4622 ⭐
A small PHP library to generate YouTube-like ids from numbers. Use it when you don't want to expose your database ids to the user.
Security Onion 2965 ⭐
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Suricata Rules 669 ⭐
Suricata IDS rules 用来检测红队渗透/恶意行为等，支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等
Py Idstools 228 ⭐
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Threatbus 202 ⭐
🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.
Gonids 138 ⭐
gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Adjective Adjective Animal 70 ⭐
Suitably random and reasonably unique human readable (and fairly adorable) ids
Fragscapy 51 ⭐
Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multiple successive tests to determine which options can be used to evade firewalls and IDS.
Nids Intrusion Detection 42 ⭐
Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Idcenter 31 ⭐
Nflog Zmq Pcap Pipe 22 ⭐
Tool to collect nflog and pipe it to a pcap stream/file over network (0mq) for real-time (or close to) analysis
Prickly Pete 27 ⭐
A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
Thebriarpatch 21 ⭐
An extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Graylog Zeek Content Pack 18 ⭐
BRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to capture and index BRO/Zeek logs coming from a remote sensor.
Suricata2mikrotik 20 ⭐
IPS Suricata2MikroTik -CE- is a module for Suricata to read eve.json file and search specifics alert to block the source. This connect to MikroTik via API to add the IP to block.
Remote Integrity Tool 12 ⭐
The DearBytes remote integrity tool is an IDS (Intrusion Detection System) that keeps track of files on a remote server and logs an event if a file gets added, removed or modified.
Intrusion Detection System For Iot Networks Using Gated Recurrent Neural Networks Gru 15 ⭐
An Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach
Pi.alert 544 ⭐
WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stratospherelinuxips 254 ⭐
Slips. A machine learning-based Intrusion Prevention System (IDS/IPS). Free Software. Stratosphere Laboratory
Cyber Security 75 ⭐
Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities
Whyisyoung Cade 60 ⭐
Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications
Firewall Controller 25 ⭐
A kubernetes controller running on bare-metal firewalls, creating nftables rules, configures suricata, collects network metrics
Suricata Detect Dos Attack 13 ⭐
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
Sharkticon 13 ⭐
Sharkticon is an anomaly detection system, it analyzes your network using a Transformers model adapted to the anomaly detection.
Idpi 10 ⭐
Advanced extra high speed deep packet inspect library with private AFDL language supported
Intrusion Detection 11 ⭐
Intrusion Detection using various Data Mining Techniques (KDD Cup 1999 Data)