Search Results for "intrusion detection system"

Showing 21 open source projects for "intrusion detection system"

View related business solutions
  • Dominate AI Search Results Icon
    Dominate AI Search Results

    Generative Al is shaping brand discovery. AthenaHQ ensures your brand leads the conversation.

    AthenaHQ is a cutting-edge platform for Generative Engine Optimization (GEO), designed to help brands optimize their visibility and performance across AI-driven search platforms like ChatGPT, Google AI, and more.
    Learn More
  • Unrivaled Embedded Payments Solutions | NMI Icon
    Unrivaled Embedded Payments Solutions | NMI

    For SaaS builders, software companies, ISVs and ISOs who want to embed payments into their tech stack

    NMI Payments is an embedded payments solution that lets SaaS platforms, Software companies and ISVs integrate, brand, and manage payment acceptance directly within their software—without becoming a PayFac or building complex infrastructure. As a full-stack processor, acquirer, and technology partner, NMI handles onboarding, compliance, and risk so you can stay focused on growth. The modular, white-label platform supports omnichannel payments, from online, mobile and in-app to in-store and unattended. Choose from full-code, low-code, or no-code integration paths and launch in weeks, not months. Built-in risk tools, flexible monetization, and customizable branding help you scale faster while keeping full control of your experience. With NMI’s developer-first tools, sandbox testing, and modern APIs, you can embed payments quickly and confidently.
    Learn More
  • 1
    Elkeid

    Elkeid

    Open source solution that can meet the requirements of workloads

    Elkeid is an open-source platform for security and intrusion-detection that aims to support a wide variety of deployment contexts — from bare-metal hosts to containers, Kubernetes clusters, and even serverless environments. It was born out of ByteDance’s internal security best practices, offering for community users a subset of its enterprise-grade capabilities. Elkeid combines kernel-level data collection, user-space agents, and runtime instrumentation (RASP) to detect malicious behavior, file anomalies, runtime exploits, and suspicious container activity. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 3
    Scope Sentry

    Scope Sentry

    Cyberspace asset mapping and vulnerability scanning platform

    ScopeSentry is an open source cybersecurity tool designed for cyberspace asset mapping and automated security analysis. It helps security researchers and penetration testers discover, monitor, and analyze internet-facing assets belonging to a target scope. ScopeSentry combines multiple reconnaissance and vulnerability assessment capabilities such as subdomain enumeration, port scanning, directory scanning, and sensitive information detection. ScopeSentry can automatically identify assets and...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    CrowdSec

    CrowdSec

    Firewall able to analyze visitor behavior & provide adapted response

    ...Crowdsec shouldn't, and didn't crash any production so far we know, but some features might be missing or undergo evolutions. IP Blocklists are limited to very-safe-to-ban IPs only (~5% of the global database so far, will grow soon). A modern behavior detection system, written in Go. It stacks on Fail2ban's philosophy, but uses Grok patterns & YAML grammar to analyse logs, a modern decoupled approach (detect here, remedy there) for Cloud/Containers/VM based infrastructures. Once detected you can remedy threats with various bouncers (block, 403, Captchas, etc.) and blocked IPs are shared among all users to further improve their security. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • Run your private office with the ONLYOFFICE Icon
    Run your private office with the ONLYOFFICE

    Secure office and productivity apps

    A Comprehensive Alternative to Office 365 for Business
    Learn More
  • 5
    Gonzo

    Gonzo

    Real-time terminal log analyzer with AI insights and dashboards

    Gonzo is an open source, Go-based terminal UI for real-time log analysis. It lets developers and SREs analyze live log streams directly in the terminal using an interactive dashboard with charts, filters, and structured views. It supports multiple input sources, including files, stdin, and OpenTelemetry streams, while automatically detecting formats such as JSON and logfmt. Users can explore logs through a k9s-inspired layout, combining visualizations like heatmaps, severity distributions,...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 6
    do - Dependency Injection

    do - Dependency Injection

    A dependency injection toolkit based on Go 1.18+ Generics

    do - Dependency Injection is a lightweight dependency injection toolkit for Go that implements the DI pattern using the language’s generics system to provide strong type safety and minimal runtime overhead. The library offers a service container that allows developers to register, resolve, and manage application dependencies in a structured and maintainable way. It supports multiple service lifecycles such as eager, lazy, and transient loading, along with circular dependency detection and interface binding. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    ludo

    ludo

    A libretro frontend written in golang

    Ludo is a user-friendly, lightweight frontend for the libretro ecosystem, designed to make retro game emulation simple and accessible. Unlike more complex frontends like RetroArch, Ludo emphasizes minimalism and ease of use, offering a plug-and-play experience with clean navigation and fast loading times. It supports multiple libretro cores, handles gamepad input automatically, and works across platforms with a native UI. Ludo is ideal for users who want to enjoy retro games with minimal...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 8
    werf

    werf

    The CLI tool gluing Git, Docker, Helm, and Kubernetes

    ...To use it, you need to describe the configuration of your application (in other words, how to build and deploy it to Kubernetes) and store it in a Git repo, the latter acts as a single source of truth. In short, that's what we call GitOps today. werf is not a complete CI/CD solution, but a tool for creating pipelines that can be embedded into any existing CI/CD system. It literally "connects the dots" to bring these practices into your application. We consider it a new generation of high-level CI/CD tools. werf builds Docker images using Dockerfiles or an alternative fast built-in builder based on the custom syntax. It also deletes unused images from the Docker registry. werf deploys your application to Kubernetes using a chart in the Helm-compatible format with handy customizations and improved rollout tracking mechanism, error detection, and log output.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    Hysteria

    Hysteria

    Hysteria is a powerful, lightning fast and censorship resistant proxy

    Hysteria is a high-performance, censorship-resistant proxy and VPN-like networking tool designed to deliver fast, reliable connectivity over unstable or lossy networks by leveraging a custom UDP/QUIC-based transport layer that can masquerade as standard HTTP/3 traffic to evade detection. It supports a wide range of use cases including SOCKS5 and HTTP proxying, TCP/UDP forwarding, Linux TProxy for network redirection, and even tunneling via TUN interfaces, making it a flexible choice for...
    Downloads: 20 This Week
    Last Update:
    See Project
  • Solve Your Real-world Business Challenges From A Single Timesheet With Powerful Built In Integration Icon
    Solve Your Real-world Business Challenges From A Single Timesheet With Powerful Built In Integration

    Timecontrol Is Your Multipurpose Timesheet Software

    TimeControl is a multi-purpose timesheet system designed to serve both Finance and Project Management. TimeControl has been designed to serve many purposes simultaneously. TimeControl tracks time on a task-by-task, project-by-project basis. Yet, despite its project-based controls, it remains a financial timesheet with all the controls necessary to fulfill the stringent needs of payroll, human resources, billing and finance. TimeControl is available both for subscription in the cloud or for purchase for an on premise installation and includes both a browser interface and the free TimeControl Mobile App for iOS and Android devices.
    Learn More
  • 10
    teler

    teler

    Real-time HTTP Intrusion Detection

    teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide by the community. kitabisa/teler-waf: teler-waf is a Go HTTP middleware that provide teler IDS functionality to protect against web-based attacks and improve the security of Go-based web applications. It is highly configurable and easy to integrate into existing Go applications. teler provides alerting when a threat is detected, push notifications include Slack, Mattermost, Telegram and Discord. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    Artalk

    Artalk

    Your Self-hosted Comment System

    Artalk is a modern, self-hosted comment system designed to provide a fast, privacy-focused alternative to third-party commenting platforms for blogs, websites, and web applications. It combines a lightweight frontend written in vanilla JavaScript with a high-performance backend powered by Go, enabling efficient cross-platform deployment and low resource usage. The system is framework-agnostic, allowing it to be integrated into virtually any frontend stack without dependency conflicts or...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Pinchtab

    Pinchtab

    High-performance browser automation bridge and orchestrator

    Pinchtab is a lightweight browser automation backend built specifically for AI agents that need efficient, programmatic web control. Implemented as a small standalone HTTP server, it allows any agent or script to interact with web pages using simple API calls instead of heavyweight browser frameworks. The tool emphasizes accessibility-first snapshots that dramatically reduce token usage compared to screenshot-based approaches, making it cost-effective for large-scale automation. It launches...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 13
    Coraza

    Coraza

    OWASP Coraza WAF is a golang modsecurity compatible firewall library

    Coraza is an open-source, enterprise-grade, high-performance Web Application Firewall (WAF) ready to protect your beloved applications. It is written in Go, supports ModSecurity SecLang rulesets and is 100% compatible with the OWASP Core Rule Set. Coraza is a drop-in alternative to replace the soon-to-be abandoned Trustwave ModSecurity Engine and supports industry-standard SecLang rule sets. Coraza runs the OWASP Core Rule Set (CRS) to protect your web applications from a wide range of...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 14
    Sonic iOS

    Sonic iOS

    Bridge of iOS Devices by usbmuxd

    ...On the Mac, usbmuxd is a service of Apple, which is mainly used to implement TCP connections on the USB protocol. Both iTunes and Xcode use this service, so the Windows system needs to install iTunes.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 15
    vLLM Semantic Router

    vLLM Semantic Router

    System Level Intelligent Router for Mixture-of-Models at Cloud

    Semantic Router is an open-source system designed to intelligently route requests across multiple large language models based on the semantic meaning and complexity of user queries. Instead of sending every prompt to the same model, the system analyzes the intent and reasoning requirements of the request and dynamically selects the most appropriate model to process it. This approach allows developers to combine multiple models with different strengths, such as lightweight models for simple...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Scalytics Open Intelligence - OSINT

    Scalytics Open Intelligence - OSINT

    Open OSINT stack for monitoring, analysis, and risk detection

    EUOSINT is the open-source edition of the OSINT pipeline built by Scalytics for real-world intelligence monitoring, situation analysis, and risk detection. It is not a toy dashboard or a loose script bundle. It is a packaged operational stack with a web interface, a Go-based collector runtime, configurable ingestion and refresh cadence, Docker-first deployment, and local or server installation options. The public release removes non-public and protected integrations while preserving the pipeline structure and deployment model that make the system usable in practice. ...
    Downloads: 31 This Week
    Last Update:
    See Project
  • 17
    sitemaptool

    sitemaptool

    A cross-platform sitemap pnp handler written in Go.

    This is a simple cli backend tool designed for ease of use. It manages your sitemaps on a live/production site by adding urls and pinging search engines. Just call and pass arguments and it will do the rest. Suitable for sites content sites (blog, social media, etc) as every public post needs to be added to sitemaps and indexed. Sites like soundcloud, instagram, tiktok, facebook, youtube and even medium might find this useful.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    Halfrost-Field Frostland

    Halfrost-Field Frostland

    This is the place to blog

    Halfrost-Field is a large public “knowledge and blog repository” maintained by a developer who documents a wide variety of computer-science, programming, and machine-learning content — from classic algorithms, ML fundamentals, to system design and broader engineering topics. The repository is structured like a personal technical blog/book: it contains “contents” directories with Markdown-based notes, tutorials and guides. For example, there is a full machine learning course outline (regression, neural networks, SVMs, unsupervised learning, anomaly detection, large-scale ML, even application examples like OCR), that reads like a self-study curriculum. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    GmSSL

    GmSSL

    Password toolbox that supports national secret

    GmSSL is an open source library of domestic commercial ciphers independently developed by Peking University. It realizes comprehensive functional coverage of national secret algorithms, standards, and secure communication protocols. It supports mainstream operating systems and processors including mobile terminals, and supports cryptographic keys, Cipher cards and other typical domestic cryptographic hardware provide feature-rich command line tools and multiple compiled language programming...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 20
    Kubesploit

    Kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command

    ...When running an exploit, it will practice the organization's cyber event management, which doesn't happen when scanning for cluster issues. It can help the organization learn how to operate when real attacks happen, see if its other detection system works as expected and what changes should be made.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Trojan-Go

    Trojan-Go

    A Trojan proxy written in Go

    ...TLS is a mature encryption system, and HTTPS uses TLS to carry HTTP traffic. For passive testing, the flow of the Trojan agreement is completely consistent with the characteristics and behavior of the HTTPS flow. HTTPS traffic accounts for more than half of current Internet traffic, and the traffic is confidential after TLS's handshake is successful. There is almost no feasible way to distinguish Trojan protocol traffic from it.
    Downloads: 9 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB