SSHWATCH v2.0 Intrusion Prevention System (IPS) for Secure Shell (SSH)
Continuously tail system security logs, searching for failed SSH login attempts. After a set number of consecutive failed attempts, the source IP is blocked using iptables and NMAP/DIG is run to probe the blocked IP. Requirements: Linux (Redhat, Debian) root or equivalent, OPENSSH Server, Python 2.4+, iptables (IPv4), NMAP.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.
NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.
A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.
A userland implementation of the Network Block Device protocol that enables remote block device access over network connections for distributed storage and virtualization use cases.
A free DNS recursive service that blocks malicious host names and protects user privacy.
WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.