Category: Network Defense

Real Intelligence Threat Analytics

RITA: Real Intelligence Threat Analytics

Real Intelligence Threat Analytics Real Intelligence Threat Analytics (RITA) is an open-source framework for network traffic analysis. The framework ingests Bro Logs, and currently supports the following analysis features: Beaconing Detection: Search for signs of...

Snort 3

Snort: Intrusion Prevention System

Snort++ Snort 3 is the next generation Snort IPS (Intrusion Prevention System).   This version of Snort++ includes new features as well as all Snort 2.X features and bug fixes for the base version...

endpoint security

wazuh: Host and endpoint security

Wazuh Wazuh helps you gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and application level. This solution, based on lightweight multi-platform agents, provides the following capabilities:   Log...

cloud-native security tool

Falco: A cloud-native security tool

Falco Falco is a cloud-native security tool. It provides near real-time threat detection for cloud, container, and Kubernetes workloads by leveraging runtime insights. Falco can monitor events defined via customizable rules from various sources, including the...

Cloud Custodian

Cloud Custodian: Rules engine for cloud security

Cloud Custodian Cloud Custodian is a rules engine for managing public cloud accounts and resources. It allows users to define policies to enable a well-managed cloud infrastructure, that’s both secure and cost-optimized. It consolidates...

fastnetmon

fastnetmon: very fast DDoS analyzer

FastNetMon FastNetMon – A high-performance DoS/DDoS load analyzer built on top of multiple packet capture engines (NetFlow, IPFIX, sFLOW, SnabbSwitch, netmap, PF_RING, PCAP). What can we do? We can detect hosts in our networks...

Secure cloud framework

parsec-cloud: Secure cloud framework

Parsec Parsec allows you to easily share your work and data in the cloud in total privacy thanks to end-to-end cryptographic security. Key features: Works as a virtual drive on you computer. You can...

Security Scorecards

Security Scorecards: OSS Security Scorecards

Security Scorecards Goals Automate analysis and trust decisions on the security posture of open source projects. Use this data to proactively improve the security posture of the critical projects the world depends on. Checks...

Artifact Composition

guac: Graph for Understanding Artifact Composition

GUAC: Graph for Understanding Artifact Composition Graph for Understanding Artifact Composition (GUAC) aggregates software security metadata into a high-fidelity graph database—normalizing entity identities and mapping standard relationships between them. Querying this graph can drive...