zeek network security monitoring NIDS HIDS
-
Updated
Oct 17, 2020 - Ruby
zeek network security monitoring NIDS HIDS
A comprehensive network device and firmware security management browser extension that provides real-time network scanning, vulnerability detection, and security monitoring capabilities.
openvas network security monitoring NIDS HIDS
Check compliance of EC2 instances for session mirroring
A very comprehensive network security using Pi-hole, Azure Artificial Intelligence, and Quantum Concepts simulations
A passive network monitoring application (like tcpdump) written in C++.
Whilst learning Cisco Packet Tracer I began to create and work on certain projects that helped me design and secure my HQ Operated Network with a site to site established network connection with VLANs and Internet setup with security steps necessary to prevent malicious attackers
Windows app that monitors the LAN for new devices using ARP and sends an alert to Discord.
network security monitoring NIDS HIDS CTI DFIR
A C# .net core implementation of the Community ID flow hashing standard
Designed and securely configured using Cisco Packet Tracer, applying L2 VLAN Security, Site-to-site VPN, Appropriate Access Control Lists (ACL), Port Security and Basic Device Security.
Overnight Hercules for Network Security: Become a Security Analyst - NSM Opensearch Image
The Ultimate ARP Spoofer Tool is a powerful network security tool designed for ARP spoofing attacksㅤㅤㅤㅤㅤㅤㅤㅤ Version 2 Under Construction
Use nmap and other network tools easily and efficiently
Real-time network defence. Enterprise-grade intelligence. SaaS
A minimal Bash tool that displays the latest syslog entries in real time, highlights severity levels with colors, and shows message counts.
Templates for writing applications using Zeek NSM communication library Broker
This project integrates Wazuh, ELK Stack (Elasticsearch, Logstash, Kibana), and Splunk to create a comprehensive network security monitoring solution. It collects, processes, stores, and analyzes security logs from endpoints and network devices, providing real-time threat detection, incident response, and visual dashboards.
Documentation of the MMT (Montimage Monitoring Tool) framework
Use the host-as-sensor model to enumerate security-relevant information about a RHEL host and the surrounding network, identifying and reporting changes via syslog. Written in python3.
Add a description, image, and links to the network-security-monitoring topic page so that developers can more easily learn about it.
To associate your repository with the network-security-monitoring topic, visit your repo's landing page and select "manage topics."