Comprehensive solutions for securing network infrastructure, traffic, and communications. Task: Linux
Explore 12 curated tools and resources
Makes output from the tcpdump program easier to read and parse.
Comprehensive guide for Iptables configuration and firewall rules.
Libnids is an implementation of an E-component of Network Intrusion Detection System that emulates the IP stack of Linux 2.0.x and offers IP defragmentation, TCP stream assembly, and TCP port scan detection.
Cilium is a networking, observability, and security solution with an eBPF-based dataplane.
A wrapper around jNetPcap for packet capturing with Clojure, available for Linux and Windows.
A daemon for blocking USB keystroke injection devices on Linux systems
A KDE Plasma 4 widget that displays real-time traffic information for active network connections on Linux computers.
Set up your own IPsec VPN server in just a few minutes with IPsec/L2TP, Cisco IPsec, and IKEv2.
A simple IOC scanner bash script for Linux/Unix/OSX systems
DenyHosts is a script to block SSH server attacks by automatically preventing attackers after failed login attempts.
A simpler version of a honeypot that looks for connections from external parties and performs a specific action, usually blacklisting.
OpenSnitch is a GNU/Linux application firewall with interactive outbound connections filtering and system-wide domain blocking capabilities.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.