Search Results for "network anomaly detection"

Showing 6 open source projects for "network anomaly detection"

View related business solutions
  • Powerful Business Process Automation Icon
    Powerful Business Process Automation

    With ThinkAutomation, you get an open-ended studio to build any and every automated workflow you could ever need.

    When a message is received ThinkAutomation automatically executes one or more Automations. Automations are created using an easy to use drag-and-drop interface to run simple or complex tasks. Automations can perform many business process Actions, including: updating company databases, CRM systems and cloud services, sending outgoing emails, Teams & SMS messages, document processing, custom scripting, integration and much more. Over 100 built-in actions are included, plus ThinkAutomation is extensible with Custom Actions.  
    Learn More
  • Effortlessly Manage Product Information Icon
    Effortlessly Manage Product Information

    OneTimePIM is a comprehensive Product Information Management System designed to streamline the import and distribution of product data.

    A single source of truth for all of your product information with easy ways to distribute that data to wherever it needs to go, including the most powerful e-commerce connectors in the industry.
    Learn More
  • 1
    HD DRiVE-iNFO

    HD DRiVE-iNFO

    HD DRiVE-iNFO displays hdd and advanced output at Windows command line

    ...Main features: Displays local hdd's, networked drives, cd/dvd/bluray's, usb connected devices. Also displays additional info from all these different storage devices (dvd layers, network write access, usb device detection, etc)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Metasploit Framework

    Metasploit Framework

    Metasploit Framework

    ...It provides a modular architecture—payloads, encoders, exploits, auxiliaries, and post-exploitation modules—so security professionals can piece together complex attack chains or test defensive controls in realistic ways. Built-in features include an exploit database, network scanners, credential harvesters, and frameworks to craft reliable payload delivery while handling target nuances like mitigation bypasses and platform differences. Beyond raw exploitation, the framework includes post-exploitation tooling for lateral movement, persistence, data exfiltration simulations, and evidence collection, enabling red teams to exercise detection and incident response workflows.
    Downloads: 50 This Week
    Last Update:
    See Project
  • 3
    Wireless Universal Resource File

    Wireless Universal Resource File

    Handset Detection for Mobile Applications. Device Description Database

    WURFL lets you detect thousands of types of mobile devices accessing your web service and take decisions based on what that device can or cannot do. With WURFL, you can optimize mobile web content, effectively deliver advertisements, or analyze mobile traffic. WURFL will read HTTP requests from mobile browsers and search the Device Description Repository (DDR) for the corresponding device properties (i.e. capabilities). WURFL will return the device capabilities to your application, which...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Insidias is a next-generation intrusion detection engine, with a focus on speed, efficiency, advanced pattern matching, parallel-processing, modularity, and expandability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Secure Cloud Storage for Files, Photos and Documents | pCloud Icon
    Secure Cloud Storage for Files, Photos and Documents | pCloud

    Store, access, and manage your files on your own terms, from anywhere.

    Store, sync, and share your files securely with pCloud. Get up to 10 GB of free secure cloud storage and access your files from any device, anywhere.
    Learn More
  • 5
    The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A software distribution based on Debian/Linux to provide network diagnostics, security monitoring and intrusion detection. The distribution can be easily installed by office personnell.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB