SnortConf is a tool that provides an intuitive menu-based text interface for setting up the IDS tool Snort. It also provides error and sanity checking on user input, and an online help facility.
79315da95214e1820919debe85714fcdaf1ce062802bfe4ba31554dacd0f1a77
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
cb3427da022cdb0e4af1d56b4fee53babe3ababc1afd76728031a4b3a989c24f
Snort IDScenter is a GUI for Snort IDS on Windows platforms. Configuration and management of the IDS can be done using IDScenter. Main features are: Snort configuration wizard (variables, preprocessor plugins, output plugins, rulesets), alert notification via e-mail, sound or only visual notification, alert file monitoring (up to 10 files), MySQL alert detection, Log rotation (compressed archiving of log files), AutoBlock (using NetworkICE BlackICE Defender you can block attackers IP's that Snort logged), integrated log viewer (supports text files, XML and HTML/webpages), program execution if an attack was detected, test configuration feature, etc.
cb934628151614ea721639e8cd996e13cf36a749a3de01353bb96a110ea3ba2d
RazorBack is a log analysis program that interfaces with the snort IDS to provide real time visual notification when an intrusion signature has been detected on the network. RazorBack is designed to work within the GNOME framework on Unix platforms.
bb701a4ded74bdbab40cda51529ad2df9d2b1522522dd862a74fa99f5b7ad65a
IDSCenter v1.09b1_2 is a panel for SNORT-Win32, a tool for managing, controlling, and monitoring the Snort IDS. IDScenter support alarm sound functions and has error checking procedures. If Snort is killed, IDScenter restarts Snort immediately.
5712288465feabb121a122437cd3c64074f86592fb7abcf459750ac2c7cf3b13
Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.
33dce30ea53feca0860465757a1efa519ec41ab2990858f0d079760a48c366a2
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
8ebea7d0d6bd53e7785834b08203175c2cf29e3eb2c55c382143b603ef25cf4f
SnortConf is a tool that provides a fairly intuitive menu-based text interface for setting up the GPL IDS tool Snort. It also provides error and sanity checking on user input, and an online help facility.
57332b70a4f6572828c412ee0be68a2b4b60779721748edd10a6e2c6b4176f71
Snort-rep is a Snort reporting tool that can produce text or HTML output from a syslog snort log file. It is intended to be used for daily e-mail reports to the system administrators. If snort v1.8+ is used, all reports contain priority information, and the HTML output contains direct links to the IDS descriptions of whitehats.com.
44f8754a53bd1c55c9085fec01fe3be5f8a6c13d2fa786514054627fc6cad946
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
1340b33f5dfe0eeaa4567f6d7341a523ee3f582b4f73bac4157c33820370c72d
Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.
46adf59384df5ca7c2c095ffeccfb3c7e7ad2d0beb49cb9f31f7dd68985ac1bd
Snort-rep is a Snort reporting tool that can produce text or HTML output from a syslog snort log file. It is intended to be used for daily e-mail reports to the system administrators. If snort v1.8+ is used, all reports contain priority information, and the HTML output contains direct links to the IDS descriptions of whitehats.com.
0ab8683852c7e18080d19765988aadafd1044192da7ab0db09608fc7faa15bc7
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
c305a83d444273f36fe616be53e47889e553f1076437495c3cb20aa4dea2051c
Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.
f3d2808aedba283d932feccb92c56fc6400bf41a09006aa8dab2182362aec3ca
Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.
d68c074164985155f1cfd504a7a9a8614519f1212f938164f858d172cfdcd304
Snort-rep is a Snort reporting tool that can produce text or HTML output from a syslog snort log file. It is intended to be used for daily e-mail reports to the system administrators. If snort v1.8+ is used, all reports contain priority information, and the HTML output contains direct links to the IDS descriptions of whitehats.com.
d91eb7ef5cf24f6b236c8a59a071a9b15877cd0f0a2ac41c6853ab021b9ece16
Snort-rep is a Snort reporting tool that can produce text or HTML output from a syslog snort log file. It is intended to be used for daily e-mail reports to the system administrators. If snort v1.8+ is used, all reports contain priority information, and the HTML output contains direct links to the IDS descriptions of whitehats.com.
c89df7ced4ea6a21aaef1c5363d46f2c48c2892d1bc1264567b391f626346025
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
4d1758cc97b22d5a33fe1465a85b6287d69b8d7e2b677d5193df92f53f593797
Snort-rep is a Snort reporting tool that can produce text or HTML output from a syslog snort log file. It is intended to be used for daily e-mail reports to the system administrators. If snort v1.8+ is used, all reports contain priority information, and the HTML output contains direct links to the IDS descriptions of whitehats.com.
9522e8f64c1ea233aa3195e5dc3679d130d38d5ad8beaa23061b7e061b674412
Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.
13c700efd8d2693ba1bd67da850e173823b70458c974975a6d4e76e11c35bce6
Hogwash is designed to take out 95% of the stock attacks all the kiddies throw at your network by dropping packets flagged by Snort. Hogwash is a layer 2 packet scrubber which sits in line, dropping packets based on signature matches. The rule set will be familiar to anyone that has used snort before. Hogwash supports passive host identification and adaptive rule sets for added accuracy.
017e3b23dd3434180ce58ff9ca20566d9d15ffeea93e42528a902f0752830850
snort-rep is a Snort reporting tool that can produce text or HTML output from a syslog snort log file. It is intended to be used for daily e-mail reports to the system administrators. If snort v1.8+ is used, all reports contain priority information, and the HTML output contains direct links to the IDS descriptions of whitehats.com.
d1c9ac7e982f801a340d17da9da3e2f961fc9107e3a685bacb42fc02081bfd02
snort-rep is a Snort reporting tool that can produce text or HTML output from a syslog snort log file. It is intended to be used for daily e-mail reports to the system administrators. If snort v1.8+ is used, all reports contain priority information, and the HTML output contains direct links to the IDS descriptions of whitehats.com.
b9895bf2d3226917e9a405e816c5229d3384461acf45e0229d7459ba3dc9c223
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
e88f11f9aa68b2cd57033ace0534773b6d1d0d859b11c8b2682ef148931afc65
IDSCenter v1.08c is a panel for SNORT-Win32, a tool for managing, controlling, and monitoring the Snort IDS. IDScenter support alarm sound functions and has error checking procedures. If Snort is killed, IDScenter restarts Snort immediately.
744797fe36926e0ff3b96e399893dda7fefa4e90b9a2e54ccc708a2fb5d53bb0