Showing 34 open source projects for "web attacks detection"

View related business solutions
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 1
    ModSecurity Nginx Connector

    ModSecurity Nginx Connector

    ModSecurity v3 Nginx Connector

    ModSecurity-nginx is the connector that embeds the ModSecurity v3 (libmodsecurity) web application firewall engine into NGINX. It integrates WAF processing into the NGINX request/response phases, allowing rules to inspect headers, bodies, and even streaming request data before it reaches upstream apps. Operators can load the OWASP Core Rule Set or custom rules to detect and block common attacks such as SQLi, XSS, RCE patterns, and protocol anomalies.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    Mojolicious (Mojo)

    Mojolicious (Mojo)

    Perl real-time web framework

    Mojolicious is a modern, real-time web framework for Perl that ships batteries-included for building both APIs and dynamic web apps. It features a fast non-blocking I/O loop, a built-in HTTP/1.1 and WebSocket server, and first-class support for JSON, templates, and routing. Developers can start small with Mojolicious::Lite, a concise DSL for single-file apps, then grow into a full MVC structure with controllers, plugins, and reusable components. The framework emphasizes developer ergonomics:...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server

    Anti-Spam SMTP Proxy Server implements multiple spam filters

    The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Hidden-Markov-Model and/or Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Files' to download the professional version 2.8.1 build 24261. A linux(ubuntu 20.04 LTS) and a freeBSD 12.2 based ready to run OVA of ASSP V2 are...
    Leader badge
    Downloads: 40,333 This Week
    Last Update:
    See Project
  • 4
    Afick is a fast and portable intrusion detection and integrity monitoring system, designed to work on all platform (it only needs perl and standard modules), including windows, linux, unix. The configuration syntax is very close from tripwire/aide
    Leader badge
    Downloads: 13 This Week
    Last Update:
    See Project
  • The AI-powered unified PSA-RMM platform for modern MSPs. Icon
    The AI-powered unified PSA-RMM platform for modern MSPs.

    Trusted PSA-RMM partner of MSPs worldwide

    SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
    Learn More
  • 5
    Netdeep Secure Firewall

    Netdeep Secure Firewall

    Next Generation Open Source Firewall

    Netdeep Secure is a Linux distribution with focus on network security. Is a Next Generation Open Source Firewall, which provides virtually all perimeter security features that your company may need. It offers Web content filters, ensuring better performance of the network, allowing users to use the service efficiently and securely, providing a deep control of the use of the Web access service, blocking access to unwanted websites, Virus, Spam, Applications and intrusion attempts. Its...
    Leader badge
    Downloads: 28 This Week
    Last Update:
    See Project
  • 6
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available...
    Leader badge
    Downloads: 174 This Week
    Last Update:
    See Project
  • 7
    MailCleaner

    MailCleaner

    Anti Spam SMTP Gateway

    MailCleaner Open Source Edition is now discontinued but will continue under the spamtagger project https://github.com/SpamTagger [antispam] MailCleaner is an anti-spam / anti-virus filter SMTP gateway with user and admin web interfaces, quarantine, multi-domains, multi-templates, multi-languages. Using Bayes, RBLs, Spamassassin, MailScanner, ClamAV. Based on Debian. Enterprise ready. MailCleaner is an anti spam gateway installed between your mail infrastructure and the Internet. It...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 8

    ViciStack - VICIdial Call Center Tools

    VICIdial call center optimization tools, monitoring utilities, and per

    VICIdial call center optimization tools, scripts, and monitoring utilities for system administrators and call center managers. Includes performance tuning guides, AMD (Answering Machine Detection) analysis tools, compliance automation scripts, and real-time monitoring dashboards for VICIdial-based contact centers running on Asterisk PBX. Key features: - Server performance monitoring and alerting - AMD accuracy tuning and analysis - Campaign optimization scripts - Compliance and DNC...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Slipstream

    Slipstream

    NAT Slipstreaming allows an attacker to remotely access any TCP/UDP

    Slipstream (also referred to as “NAT Slipstreaming”) is a proof-of-concept exploit framework that allows an attacker to remotely access any TCP or UDP service running on a victim machine inside a NAT (behind a router/firewall) simply by tricking the target to visit a malicious website. It works by abusing the NAT’s Application Level Gateway (ALG) logic and connection tracking, combined with browser capabilities like WebRTC, precise packet fragmentation or boundary control, and packet...
    Downloads: 14 This Week
    Last Update:
    See Project
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • 10
    Perl Nopaste is a Nopaste software written in Perl and with MySQL as backend. It includes features like Syntax Highlighting for more than 20 languages, Badword and Badhost with hitrate, language detection and translation, expiring function, direct do
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    OWASP ModSecurity CRS

    OWASP ModSecurity CRS

    OWASP ModSecurity Core Rule Set (CRS) Project

    The OWASP ModSecurity Core Rule Set (CRS) is a curated, generic Web Application Firewall rule set that detects and blocks common attack categories across most web apps. It focuses on broad protection—SQL injection, cross-site scripting, local/remote file inclusion, command injection, and protocol violations—without requiring app-specific knowledge. Rules are organized into paranoia levels so operators can tune detection aggressiveness and balance false positives against coverage. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12

    IDABench

    Old School Light Weight Network Forensic Tool

    This is the fork of the SHADOW IDS produced in 2003. It has been updated to work on modern (SystemD, OpenRC) GNU suites. The original developers added the plugable architecture. It has been tweaked for TSHARK. It requires a CGI web server. It will run tcpdump 24x7x???. It will render initial analysis, and searchability. # idabench Version 1.0.1 idabench is public domain software and may be freely used and # distributed with or without modification....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    HTTP Test Tool
    httest is a script based tool for testing and benchmarking web applications, web servers, proxy servers and web browsers. httest can emulate clients and servers in the same test script, very useful for testing proxys.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    ChIP-Seq
    The ChIP-Seq software provides methods for the analysis of ChIP-seq data and other types of mass genome annotation data. The most common analysis tasks include positional correlation analysis, peak detection, and genome partitioning into signal-rich and signal-depleted regions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    lua-resty-waf

    lua-resty-waf

    High-performance WAF built on the OpenResty stack

    lua-resty-waf is a web application firewall implemented in Lua for OpenResty/NGINX, designed to run inline at the edge with low overhead. It inspects requests and responses during NGINX phases, applying rule logic and anomaly scoring to detect patterns like SQL injection, cross-site scripting, and protocol abuse. Rules are organized into policies with configurable actions—block, log, or allow—and can leverage shared dictionaries for counters, rate limits, and caching decisions. Because it...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    StarkOX

    StarkOX

    Open Source Robot Operating System

    StarkOX, the first universal Open Source AI Robot Operating System. It provides easy to use hardware abstraction and commonly-used functionality. Furthermore, strong cognitive functions, voice and pattern detection together with a new powerful scripting language provide possibilities to create and share abstract behavior patterns.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    AlienVault OSSIM

    AlienVault OSSIM

    Open Source SIEM

    OSSIM, AlienVault’s Open Source Security Information and Event Management (SIEM) product, provides event collection, normalization and correlation. For more advanced functionality, AlienVault Unified Security Management (USM) builds on OSSIM with these additional capabilities: * Log management * Advanced threat detection with a continuously updated library of pre-built correlation rules * Actionable threat intelligence updates from AlienVault Labs Security Research Team * Rich...
    Leader badge
    Downloads: 112 This Week
    Last Update:
    See Project
  • 18
    Wireless Universal Resource File

    Wireless Universal Resource File

    Handset Detection for Mobile Applications. Device Description Database

    WURFL lets you detect thousands of types of mobile devices accessing your web service and take decisions based on what that device can or cannot do. With WURFL, you can optimize mobile web content, effectively deliver advertisements, or analyze mobile traffic. WURFL will read HTTP requests from mobile browsers and search the Device Description Repository (DDR) for the corresponding device properties (i.e. capabilities). WURFL will return the device capabilities to your application, which...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Addons for IOSEC - DoS HTTP Security

    Addons for IOSEC - DoS HTTP Security

    IOSec Addons are enhancements for web security and crawler detection

    IOSEC PHP HTTP FLOOD PROTECTION ADDONS IOSEC is a php component that allows you to simply block unwanted access to your webpage. if a bad crawler uses to much of your servers resources iosec can block that. IOSec Enhanced...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 20
    Sqlninja is an exploitation tool to be used against web apps based on MS SQL Server that are vulnerable to SQL Injection attacks, in order to get a shell or extract data also in very hostile conditions. For more information please check http://sqlninja.sf.net
    Downloads: 11 This Week
    Last Update:
    See Project
  • 21

    Moving Target Detection 2D

    Moving target detection in 2D using Kalman Filter

    Moving target detection in 2D using Kalman Filter written in JS for demo purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Munin Contrib

    Munin Contrib

    Contributed stuff for munin (plugins, tools, etc...)

    ...The repository also serves as a learning resource: you can crib patterns for performance tuning, environment detection, and Munin’s plugin protocol. For operators, it dramatically shortens the path between “I wish I could graph X” and a consistent time-series chart in production.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ZoneMinder is video and cctv surveillance and security application. It supports multiple video or IP cameras and a sophisticated motion detection system based around zones. Both live streams and historic events can be viewed via the web interface.
    Leader badge
    Downloads: 24 This Week
    Last Update:
    See Project
  • 24
    inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    This is an NIDS/HIDS, Network plus Host based Intrusion Detection System. Este é um NIDS / HIDS, Sistema de Detecção de Invasões Baseado em Redes e em Máquinas.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB