Search Results for "intrusion detection system code in java"

Showing 21 open source projects for "intrusion detection system code in java"

View related business solutions
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • 1
    ByteHook

    ByteHook

    ByteHook is an Android PLT hook library

    ByteHook is a ByteDance-hosted project whose name suggests a hooking or instrumentation library, likely used for hooking system calls or API calls for monitoring, sandboxing or instrumentation. The repository appears to aim at low-level hooking/injection capabilities, perhaps to support runtime introspection, behavioral monitoring, or hooking-based instrumentation (e.g. for security, tracing, sandboxing, or debugging). Because hooking is a common technique for intercepting library or system...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Discovery

    Discovery

    Nepxion Discovery is a solution for Spring Cloud

    Nepxion Discovery is a solution for Spring Cloud with blue green, gray, route, blacklist, limitation, circuit breaker, degrade, isolation, monitor, tracing, dye, failover, async agent. Only one or more services are upgraded at a time, the upgrade is completed and monitored and observed, and this process is performed continuously until all the old versions in the cluster are upgraded to the new version. In the process of stopping the old version, it is impossible to accurately calculate...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    Coraza

    Coraza

    OWASP Coraza WAF is a golang modsecurity compatible firewall library

    Coraza is an open-source, enterprise-grade, high-performance Web Application Firewall (WAF) ready to protect your beloved applications. It is written in Go, supports ModSecurity SecLang rulesets and is 100% compatible with the OWASP Core Rule Set. Coraza is a drop-in alternative to replace the soon-to-be abandoned Trustwave ModSecurity Engine and supports industry-standard SecLang rule sets. Coraza runs the OWASP Core Rule Set (CRS) to protect your web applications from a wide range of...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 4
    wxMEdit

    wxMEdit

    wxMEdit, Cross-platform Text/Hex Editor, Improved Version of MadEdit

    •Added automatically checking for updates •Added bookmark support •Added right-click context menu for each tab •Added purging histories support •Added selecting a line by triple click •Added FreeBASIC syntax file •Added an option to place configuration files into %APPDATA% directory under Windows •Improved support for Find/Replace •Improved Mac OS X support •Improved system integration under Windows •Improved encoding detection result •Improved Hex editing support •Added more...
    Leader badge
    Downloads: 144 This Week
    Last Update:
    See Project
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 5
    EasyProtector

    EasyProtector

    Simple way to check root/virtual app/emulator/xposed framework

    EasyProtector, a simple way to check root/virtual app/emulator/xposed framework/tracer/debugger. Since it's all here, you are welcome to star/fork, even if you raise an issue, I hope this is a useful library (eliminate the initialization operation of the application, avoid more permission requirements, and load as lazy as possible) Mainly to fix a bunch of bugs, see the pictures in the image folder for the adaptation situation, Tencent Legu's old version of XposedCheck code has some code in...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    JCSprout

    JCSprout

    Basic, concurrent algorithm

    JCSprout is a curated learning path for Java engineers that mixes concise notes, diagrams, and runnable examples to cover core computer science and JVM topics. It walks readers through data structures and algorithms, networking fundamentals, Java concurrency, JVM memory model and GC, and common interview problem patterns. The repository emphasizes understanding over memorization, linking conceptual summaries with small code artifacts that can be compiled and profiled. It also highlights best...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    JPPF

    JPPF

    The open source grid computing solution

    JPPF makes it easy to parallelize computationally intensive tasks and execute them on a Grid.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8

    jfail2ban

    java alternative to Fail2ban

    The goal of jfail2ban is to provide platform independent intrusion detection similar to Fail2ban.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    smartIDS

    Lightweight intrusion detection for IoT and embedded devices.

    The aim of the project is a lightweight intrusion detection library for embedded devices which supports MSP430 and ARM Cortex based devices. Features include DSP/SIMD support, IoT and embedded protocols, distributed operation, event and history management, tool supported configuration and visualization. There is a Java port that supports less features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Turn traffic into pipeline and prospects into customers Icon
    Turn traffic into pipeline and prospects into customers

    For account executives and sales engineers looking for a solution to manage their insights and sales data

    Docket is an AI-powered sales enablement platform designed to unify go-to-market (GTM) data through its proprietary Sales Knowledge Lake™ and activate it with intelligent AI agents. The platform helps marketing teams increase pipeline generation by 15% by engaging website visitors in human-like conversations and qualifying leads. For sales teams, Docket improves seller efficiency by 33% by providing instant product knowledge, retrieving collateral, and creating personalized documents. Built for GTM teams, Docket integrates with over 100 tools across the revenue tech stack and offers enterprise-grade security with SOC 2 Type II, GDPR, and ISO 27001 compliance. Customers report improved win rates, shorter sales cycles, and dramatically reduced response times. Docket’s scalable, accurate, and fast AI agents deliver reliable answers with confidence scores, empowering teams to close deals faster.
    Learn More
  • 10

    Plaggie1.1

    Plaggie is a standalone open source plagiarism detection application

    Plaggie is an standalone open source plagiarism detection application for Java programs. The original authors are Aleksi Ahtiainen and Mikko Rahikainen. The original version can be downloaded from the website: http://www.cs.hut.fi/Software/Plaggie/ We at Maynooth University have updated the original version with following changes. 1) Grouping of students with similar submission 2) Color coding matches of code for easy detection 3) Finding groups of cheaters. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    XML-CF-lib

    XML-CF-lib

    TeleScope-CF XML Content Filtering Library

    ...C code has been re-factored into Java with minor modifications. This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusion detection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    telescope-cf-library

    telescope-cf-library

    TeleScope-CF XML Content Filtering Library

    ...C code has been re-factored into Java with minor modifications. This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusion detection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Cellular-IDS

    Cellular IDS based on Samsung's Network Extender

    The source code LMG Security used to turn a Samsung-Verizon Network Extender into a Cellular Intrusion Detection System for less than $300. The project was demonstrated at Blackhat 2013 and DEFCON 21. The CIDS project can provide direct access to cellular traffic, allowing for analysis of mobile malware behavior in ways never before possible. For more information, see our blog post and whitepaper at http://lmgsecurity.com/blog/2013/07/26/diy-cellula .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    An open-source configurable virtual testbed (based on the Eucalyptus cloud platform) for Intrusion Detection System Evaluation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Siganture Translator is a Java application which can translate signatures between different IDS's and Common Intrusion Detection Signatures Standard (CIDSS).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    IceIDS is heuristic Network Intrusion Detection System (NIDS) based on calculating Student's distributions of network traffic.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    InSecT - Invincible Security Technology - an intelligent firewall and intrusion detection system
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The Intrusion Detection Exchange Protocol (IDXP) is an application-layer protocol for exchanging data between intrusion detection entities. IDXP-Java is a Java-based implementation based upon the Java BEEP Core implementation of RFC 3080 / RFC 3081.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SnortKonsole is a Java-Frontend for the Open Source Network Intrusion Detection System Snort. It supports all configuration-aspects of Snort. The configuration distribution and activating of sensors is done via scp/ssh.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Experimental Hybrid Intrusion Detection System written in Java
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB