Open Source
ACID (Analysis Console for Intrusion Databases)
Powerful PHP-based data analysis tool for network security events captured by many common IDS tools, including snort and tcpdump.
Advanced Intrusion Detection Environment
AIDE is a file integrity checker that supports regular expressions. Licensed with GPL.
Chkrootkit
Provides open source application to check for presence of rootkits installed on Linux/Unix machines. Links to security related sites.
Fairly Fast Packet Filter
The Fairly Fast Packet Filter (FFPF) is a network monitoring framework for Linux. FFPF achieves high throughput by pushing computationally intensive tasks to the kernel or even ne…
Firestorm Network Intrusion Detection System
Firestorm is a high-performance GPL-licensed network intrusion detection system (NIDS). Features include being fully pluggable, easily configurable, and an extremely scalable sign…
LAk Intrusion Prevention System
A single compilation of source, binaries, scripts and whitepapers on intrusion prevention systems. The aim is to quickly establish a working IPS within minutes.
LIDS Project - Secure Linux System
LIDS is an enhancement for the Linux kernel written by Xie Huagang and Philippe Biondi. It implements several security features that are not in the Linux kernel natively. Some of t…
myNetWatchman.com
Intrusion Reporting and Response. Users forward firewall logs that are aggregated and analysed to identify incidents that are reported to the responsible party.
Open-Source IDS
A complete intrusion detection system created with well known open-source tools. Implemented using a custom RedHat 7.2 distribution and available for download as a stand-alone ISO…
Passive OS Fingerprinting (pOf)
An advanced passive OS/network fingerprinting utility for use in IDS environments, honeypots environments, firewalls and servers.
Prelude hybride opensource IDS
Prelude is a new innovative hybrid Intrusion Detection system designed to be very modular, distributed, rock solid and fast.
QuIDScor IDS/VA correlation
QuIDScor is an Open Source project demonstrating the value in correlating information between Intrusion Detection Systems (such as Snort) and vulnerability assesment and management…
Rootkit Hunter
Open-source GPL rootkit scanner for Unix-like systems. Scans for rootkits, trojans, backdoors and local exploits. Tests include scanning of plaintext and binary files for MD5 has…
Shadow Intrusion and Network Analysis
Shadow is an intrusion-detection system from the Naval Surface Warfare Center, shows promise in detecting previously unknown attacks for which no known detection signatures exist.
sLink project
sLink consists of a daemon and a suite of cgi programs which provide a web administration interface to an EDM/BOSCH Solution16 Alarm Panel.
Showing 20–20 of 26 results