Brute force detection with exponential-decay pressure scoring, 57 service rules, 8 firewall backends, GeoIP enrichment, and multi-channel alerting
-
Updated
Apr 24, 2026 - Shell
Brute force detection with exponential-decay pressure scoring, 57 service rules, 8 firewall backends, GeoIP enrichment, and multi-channel alerting
Lightweight SSH brute-force analyzer. Detects threats in authentication logs, classifies severity, exports blocklists for fail2ban with NO external dependencies.
A robust Python-based real-time activity monitoring toolkit for defense (Blue Team) operations. Features configurable detection for SSH brute-force, sensitive resource access, and suspicious keywords, with JSON/log alerting, simulated input for testing, and customizable rules for live gameplay in cybersecurity.
This project demonstrates SSH authentication log analysis using Splunk SIEM to detect malicious activity such as brute-force attacks, unauthorized access attempts, and suspicious SSH behavior. It simulates real-world SOC analyst workflows, including log ingestion, SPL queries, dashboards, and alerting.
Lightweight security log analysis engine built with Spring Boot. LogPulse automates threat detection for brute-force attacks, suspicious login patterns, and account anomalies, featuring a clean, minimalist web dashboard for real-time security insights.
Python-based SOC tool for detecting SSH brute-force attacks from authentication logs with IP classification and mitigation suggestions.
Brute force attack detection using SSH logs and Fail2Ban with real-world simulation and mitigation.
Python script to detect brute force SSH login attempts from raw logs
Real-time Linux server security dashboard — beautiful TUI with attack maps, gauges, and sparklines. Built in Rust. Zero dependencies. cargo install vigil
End-to-end SOC workflow simulating brute force detection on real Linux auth logs using Python log parsing, automated threat scoring, and Splunk SIEM dashboard visualization.
Authentication log analysis tool for security assessment
A command-line log analyzer written in C that detects brute-force login attempts by analyzing failed authentication logs.
Automated cybersecurity log analysis and alert system using Termux and Python — Google Certified hands-on project with SIEM, threat detection, and Blue Team tools.
Java login system with brute-force protection and attempt logging.
A comprehensive SOC lab for real-time threat detection, alerting via Telegram, and incident response using Splunk and Windows Event Logs.
CLI log anomaly detector for auth and web server logs — detects brute force, privilege escalation, and scanner behavior
🛡️ Lightweight Linux security metrics agent — deep procfs telemetry, kernel hardening audit, forensic detection, auth intelligence, and an embedded real-time analytics dashboard. Single binary. ~2MB RAM. Prometheus-native.
Mini SOC lab: Wazuh SIEM + Suricata IDS + Elastic Stack in Docker. Detects SSH brute-force & port scans with automated alerts and Kibana dashboard.
Access Log Correlator - Python based access log correlation tool for detecting failed login bursts with schema validation and JSON output.
Add a description, image, and links to the brute-force-detection topic page so that developers can more easily learn about it.
To associate your repository with the brute-force-detection topic, visit your repo's landing page and select "manage topics."