intrusion-detection topic
Digital-Forensics-Guide
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
geswall
GeSWall, Intrusion Prevention System
snort-rules
An UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Self-Way
Built to learn ethical hacking on your own
IP-BlackHole
IP.blackhole is an IP blacklist that uses multiple sensors to identify network attacks (e.g. SSH brute force) and spam incidents. All reports are evaluated and in case of too many incidents the respon...
SAURUSS-Autonomous-Drone-Surveillance
An autonomous drone and sensor based surveillance system that use a Tello Drone, an Arduino, a Raspberry Pi and an Android smartphone.
logdata-anomaly-miner
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable...
Network-Intrusion-Detection-System
Network Intrusion Detection System
firegex
Firegex is an application firewall created for CTF Attack-Defence competitions by Pwnzer0tt1