Comprehensive solutions for securing network infrastructure, traffic, and communications. Task: Intrusion Detection
Explore 10 curated tools and resources
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
An open-source network security monitoring tool.
An OpenFlow honeypot that detects unused IP addresses and simulates network traffic to attract and analyze potential threats
A multi-threaded intrusion detection system using Yara for network and stream IDS
Automated signature creation using honeypots for network intrusion detection systems.
Netcap efficiently converts network packets into structured audit records for machine learning algorithms, using Protocol Buffers for encoding.
Object scanning system with scalable and flexible architecture for intrusion detection.
A wireless network detector, sniffer, and intrusion detection system
Stenographer is a high-performance full-packet-capture utility for intrusion detection and incident response purposes.
Monitors network traffic for suspicious activity and alerts when potential threats are detected.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.