Continuously tail system security logs, searching for failed SSH login attempts. After a set number of consecutive failed attempts, the source IP is blocked using iptables and NMAP/DIG is run to probe the blocked IP. Requirements: Linux (Redhat, Debian) root or equivalent, OPENSSH Server, Python 2.4+, iptables (IPv4), NMAP.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
A website scanner that provides a sandbox for the web, allowing users to scan URLs and websites for potential threats and vulnerabilities.
A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.
WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.
A free DNS recursive service that blocks malicious host names and protects user privacy.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
pfSense is a leading open source firewall and network security solution, providing advanced protection and connectivity options.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.