Showing 121 open source projects for "network intrusion"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Elkeid

    Elkeid

    Open source solution that can meet the requirements of workloads

    ...For container or cloud-native workloads, it also supports gathering audit logs from Kubernetes and correlating events across processes, network, and file activity to detect security threats. The platform packages data collection, event-streaming, and a rule/event engine (called “HUB”) — letting users define detection rules, alerts, baseline checks, and policy enforcement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    PacketFence

    PacketFence

    Free and Open Source network access control (NAC) solution

    PacketFence is a fully-featured, open-source network access control (NAC) solution that provides secure wired and wireless network access. It supports 802.1X, captive portal authentication, device profiling, endpoint compliance, and guest access. PacketFence is used in enterprise, education, and healthcare environments to enforce security policies and network segmentation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ntopng

    ntopng

    Web-based Traffic and Security Network Traffic Monitoring

    ntopng® is a web-based network traffic monitoring application released under GPLv3. It is the new incarnation of the original ntop written in 1998, and is now revamped in terms of performance, usability, and features. ntopng is a network traffic probe that provides 360° Network visibility, with its ability to gather traffic information from traffic mirrors, NetFlow exporters, SNMP devices, Firewall logs, and Intrusion Detection systems. ntopng has been written in a portable way in order to virtually run on every Unix platform, including Linux and FreeBSD, MacOS and on Windows as well. ntopng captures traffic from SPAN/mirror ports or TAP devices using libpcap, or PF_RING (on Linux) for best performance. ...
    Downloads: 60 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Zeek

    Zeek

    Zeek is a powerful network analysis framework

    ...Vern and the project’s leadership team renamed Bro to Zeek in late 2018 to celebrate its expansion and continued development. Zeek is not an active security device, like a firewall or intrusion prevention system. Rather, Zeek sits on a “sensor,” a hardware, software, virtual, or cloud platform that quietly and unobtrusively observes network traffic. Zeek interprets what it sees and creates compact, high-fidelity transaction logs, file content, and fully customized output, suitable for manual review on disk or in a more analyst-friendly tool like a security and information event management (SIEM) system.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 6
    ESP32-Paxcounter

    ESP32-Paxcounter

    Wifi & BLE driven passenger flow metering with cheap ESP32 boards

    ...Paxcounter detects Wifi and Bluetooth signals in the air, focusing on mobile devices by evaluating their MAC addresses. The intention of this project is to do this without intrusion in privacy: You don't need to track people-owned devices if you just want to count them. Therefore, Paxcounter does not persistently store MAC addresses and does no kind of fingerprinting the scanned devices. Data can either be stored on a local SD-card, transferred to the cloud using LoRaWAN network or MQTT over TCP/IP, or transmitted to localhost using serial (SPI) interface. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available...
    Leader badge
    Downloads: 223 This Week
    Last Update:
    See Project
  • 8

    Suricata Anti-DDoS Lab

    Suricata VMware VM dor IDS practicing

    Suricata Anti-DDoS Security Lab (Debian 13 VMware Virtual Machine): Preconfigured VMware virtual machine for educational network security monitoring and intrusion detection using Suricata. Designed for hands-on IDS and SOC-style training in a controlled lab environment. Includes the following integrated services: + Suricata – network intrusion detection and traffic inspection + EveBox – alert visualisation and event analysis + DVWA – vulnerable web application for traffic generation and testing + phpMyAdmin – database management and inspection Default setup demonstrates DDoS-related detection scenarios, but the lab is fully customisable for other network-based attacks. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Netdeep Secure Firewall

    Netdeep Secure Firewall

    Next Generation Open Source Firewall

    Netdeep Secure is a Linux distribution with focus on network security. Is a Next Generation Open Source Firewall, which provides virtually all perimeter security features that your company may need. It offers Web content filters, ensuring better performance of the network, allowing users to use the service efficiently and securely, providing a deep control of the use of the Web access service, blocking access to unwanted websites, Virus, Spam, Applications and intrusion attempts. ...
    Leader badge
    Downloads: 16 This Week
    Last Update:
    See Project
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 10
    OpenFW UTM Community
    OpenFW UTM Community is a "turn-key" , fork solutions Endian Firewall UTM Community, linux security distribution that makes your system a full featured security appliance with Unified Threat Management (UTM) functionalities. The software has been designed for the best usability: very easy to install, use and manage and still greatly flexible. The feature suite includes stateful packet inspection firewall, application-level proxy HTTP with antivirus support, content filtering of Web...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 11

    ICS Sensor Sim Lab

    ICS Sensor Traffic Simulator

    This tool simulates network traffic typical of an Industrial Control System (ICS) environment. It generates synthetic Modbus/TCP packets to help test monitoring and intrusion detection systems. Quick Start To use this tool, run the simulator: bash # Run for 30 seconds and save to traffic.log python lab_runner.py ics-sim --duration 30 --output traffic.log
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Endian Firewall Community
    Endian Firewall Community (EFW) is a "turn-key" linux security distribution that makes your system a full featured security appliance with Unified Threat Management (UTM) functionalities. The software has been designed for the best usability: very easy to install, use and manage and still greatly flexible. The feature suite includes stateful packet inspection firewall, application-level proxies for various protocols (HTTP, FTP, POP3, SMTP) with antivirus support, virus and spam-filtering...
    Leader badge
    Downloads: 241 This Week
    Last Update:
    See Project
  • 13
    SQLProcexp by Fabien Sabinet

    SQLProcexp by Fabien Sabinet

    SQL Server instance monitoring & protection

    ...A free professional monitoring application for SQL Server instance with historical data of : - CPU - logical read - physical read - write - SQL Queries - Wait Time - Signal wait - 1 user configurable list of waits - and 1 SQL Query preconfigured with number of users sessions Based on capture at configurable interval (2 secondes by default) of sys.sysprocesses, sys.dm_exec_requests, sys.dm_exec_sessions, sys.dm_os_wait_stats and sys.dm_exec_query_stats. Added new network protection anti-intrusion system, after a number of trying to connect via RDP or SQL the IP is BL in the FW Added new auto update Windows application Added new analysis of IP traffic (should not stay on as it's consuming some network band) No installation needed, it’s a simple small standalone c# .NET x86 executable file Sorry not open source, don't want it to be used at all or as part for commercial purpose... ...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 14
    Why Can't I Connect?

    Why Can't I Connect?

    Makes it easier to resolve TCP/IP connection errors.

    "Why Can't I Connect?" makes it easier to resolve TCP/IP connection errors. Use it to diagnose connections to common server types and create generic clients and / or servers. A source tar, a 32 bit and 64 bit rpm, a 32 bit, 64 bit, and Raspbian / armhf deb, and a 32 bit Windows install exe are available. The 32 bit Windows executable runs fine in 64 bit Windows systems. Go to: https://www.whycanticonnect.com/?q=instructions for help / instructions. Go to:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    AIDE - Advanced Intrusion Detection Environment
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Downloads: 26 This Week
    Last Update:
    See Project
  • 17
    EQGRP

    EQGRP

    Decrypted content of eqgrp-auction-file.tar.xz

    EQGRP is a public release of the so-called Equation Group hacking tools, originally leaked online in 2017. The repository serves as an archive and reference for security researchers, documenting the exploit frameworks, implants, and utilities that were allegedly used by a highly sophisticated threat actor. The tools include network exploitation scripts, backdoors, and frameworks targeting a range of platforms and services, many of which highlight previously unknown vulnerabilities. While the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Virtual eXecuting Environment
    VXE (Virtual eXecuting Environment) is an Intrusion Prevention System (IPS). It protects Linux servers from hacker attacks from network, etc. It protects software subsystems, such as: SMTP, HTTP and any other subsystem, already installed at the server.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    AlienVault OSSIM

    AlienVault OSSIM

    Open Source SIEM

    OSSIM, AlienVault’s Open Source Security Information and Event Management (SIEM) product, provides event collection, normalization and correlation. For more advanced functionality, AlienVault Unified Security Management (USM) builds on OSSIM with these additional capabilities: * Log management * Advanced threat detection with a continuously updated library of pre-built correlation rules * Actionable threat intelligence updates from AlienVault Labs Security Research Team * Rich...
    Leader badge
    Downloads: 115 This Week
    Last Update:
    See Project
  • 20
    Snort
    ...** **As of June 2017, the mailing lists are no longer on SourceForge, and have moved to https://lists.snort.org** Snort is a libpcap-based sniffer/logger which can be used as a network intrusion detection and prevention system. It uses a rule-based detection language as well as various other detection mechanisms and is highly extensible.
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    Untangle
    Untangle is a Linux-based network gateway with pluggable modules for network applications like spam blocking, web filtering, anti-virus, anti-spyware, intrusion prevention, bandwidth control, captive portal, VPN, firewall, and more. Visit http://untangle.com
    Downloads: 38 This Week
    Last Update:
    See Project
  • 22
    Snort add-on is a network intrusion detection system for ipcop version 2. Last version of IPCOP version 2.1.9 n.b: Snort add-on needs 700 Mo minimum free space disk.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Intrusion Detection and Defense System

    Intrusion Detection and Defense System for windows

    Its a light weight Intrusion detection and defense system works with windows firewall to protect any windows operating system from attacks that are intended to hack the server or provide any operational damage. By keeping eye on network activities and event viewer logs, ServerCloak capture and log any failed/denied inbound calls from IPv4 as well as IPv6.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    RHAPIS

    RHAPIS

    NIDS Simulator

    RHAPIS is a network intrusion detection systems simulator through which you can make, detect and analyze threats virtually.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Nfsight is a Netflow processing and visualization application designed to offer a comprehensive network awareness solution. It is developed as a Nfsen plugin to provide client/server identification and intrusion detection capabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB