10

8

6

4

2


6.7

10.0

6.8

9.6

3.0

9.9

7.5

9.8

5.6

9.5

9.2

9.2

18 Security tools and projects

  • Wazuh

    6.7 10.0 C
    Wazuh - The Open Source Security Platform
  • Suricata

    6.8 9.6 C
    Suricata git repository maintained by the OISF
  • SpamAssassin

    3.0 9.9 L3 Perl
    Read-only mirror of Apache SpamAssassin. Submit patches to https://bz.apache.org/SpamAssassin/. Do not send pull requests
  • pfSense

    7.5 9.8 L2 PHP
    Main repository for pfSense
  • Snort

    5.6 9.5 L1 C++
    Snort++
  • OSQuery

    9.2 9.2 L2 C++
    SQL powered operating system instrumentation, monitoring, and analytics.
  • lynis

    8.3 8.8 Shell
    Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
  • Fail2Ban

    8.0 8.4 L2 Python
    Daemon to ban hosts that cause multiple authentication errors
  • Denyhosts

    4.0 1.1 L3 Python
    Automated host blocking from SSH brute force attacks
  • OSSEC

    7.4 4.0 L2 C
    OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
  • Blackbox

    7.5 2.7 Go
    Safely store secrets in Git/Mercurial/Subversion
  • SOCless

    2.2 4.6 Python
    The SOCless automation framework
  • fwknop

    4.6 0.0 L3 Perl
    Single Packet Authorization > Port Knocking
  • autoVPN

    5.7 0.0 Shell
    Create On Demand Disposable OpenVPN Endpoints on AWS.
  • Kippo

    5.5 0.0 L4 Python
    Kippo - SSH Honeypot
  • Glastopf

    4.2 1.5 L5 Python
    Web Application Honeypot
  • Pen Test Tools

    4.4 0.0 L5 Ruby
    Homebrew Tap - Pen Test Tools
  • CrowdSec

    6.7 9.3 Go
    CrowdSec - the open-source and participative IPS able to analyze visitor behavior & provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global CTI database to protect the user network.

Add another 'Security' Tool