📊 Tail syslog entries in real time, highlight severity with colors, and track message counts for better insight into your system logs.
-
Updated
Nov 9, 2025 - Shell
📊 Tail syslog entries in real time, highlight severity with colors, and track message counts for better insight into your system logs.
Highly customizable low-interaction experimental honeypot that mimics specific hosts.
Use the host-as-sensor model to enumerate security-relevant information about a RHEL host and the surrounding network, identifying and reporting changes via syslog. Written in python3.
Overnight Hercules for Network Security: Become a Security Analyst book
A minimal Bash tool that displays the latest syslog entries in real time, highlights severity levels with colors, and shows message counts.
The code snippet is a batch script that scans a range of IP addresses by pinging each one, retrieving the hostname and MAC address, listing open ports, and performing a traceroute. Results are saved to an output file, providing a summary of the network status for each IP address.
The reposiltory for the Design of an Anomaly Detection System for Network Security. Identifies suspicious network traffic patterns using unsupervised learning.
A very comprehensive network security using Pi-hole, Azure Artificial Intelligence, and Quantum Concepts simulations
Windows app that monitors the LAN for new devices using ARP and sends an alert to Discord.
Real-Time Detection of Multi-Stage Attacks using Kill Chain State Machines: Detect multi-stage attacks by correlating alerts from Intrusion Detection Systems (IDS) to generate scenario graphs. By prioritising alerts based on the kill chain model the RT-KCSM reduces false-positive alerts.
Real-time network defence. Enterprise-grade intelligence. SaaS
A legal and educational tool for cybersecurity testing and ethical hacking.
This is a powerful and flexible network sniffing tool written in Python. It captures network packets in real-time, analyzes them, and provides insights through both a terminal interface and an optional web-based dashboard.
this cybersecurity portfolio showcases Samuel's expertise in various security domains, including web application security and network security. His projects and reports demonstrate his skills as a penetration tester and security researcher.
Log analysis tool for detecting C2 beaconing, DNS anomalies, and SSH intrusions with geo-enrichment and Kibana visualization
A comprehensive network device and firmware security management browser extension that provides real-time network scanning, vulnerability detection, and security monitoring capabilities.
This project integrates Wazuh, ELK Stack (Elasticsearch, Logstash, Kibana), and Splunk to create a comprehensive network security monitoring solution. It collects, processes, stores, and analyzes security logs from endpoints and network devices, providing real-time threat detection, incident response, and visual dashboards.
Go implementation of the Community ID flow hashing standard
The Ultimate ARP Spoofer Tool is a powerful network security tool designed for ARP spoofing attacksㅤㅤㅤㅤㅤㅤㅤㅤ Version 2 Under Construction
Network Intrusion Detection analysis of Zeek/RITA outputs to identify probable bad actors versus corpware beacons
Add a description, image, and links to the network-security-monitoring topic page so that developers can more easily learn about it.
To associate your repository with the network-security-monitoring topic, visit your repo's landing page and select "manage topics."