Brute force detection with exponential-decay pressure scoring, 57 service rules, 8 firewall backends, GeoIP enrichment, and multi-channel alerting
-
Updated
Apr 12, 2026 - Shell
Brute force detection with exponential-decay pressure scoring, 57 service rules, 8 firewall backends, GeoIP enrichment, and multi-channel alerting
Lightweight SSH brute-force analyzer. Detects threats in authentication logs, classifies severity, exports blocklists for fail2ban with NO external dependencies.
Lightweight security log analysis engine built with Spring Boot. LogPulse automates threat detection for brute-force attacks, suspicious login patterns, and account anomalies, featuring a clean, minimalist web dashboard for real-time security insights.
A robust Python-based real-time activity monitoring toolkit for defense (Blue Team) operations. Features configurable detection for SSH brute-force, sensitive resource access, and suspicious keywords, with JSON/log alerting, simulated input for testing, and customizable rules for live gameplay in cybersecurity.
This project demonstrates SSH authentication log analysis using Splunk SIEM to detect malicious activity such as brute-force attacks, unauthorized access attempts, and suspicious SSH behavior. It simulates real-world SOC analyst workflows, including log ingestion, SPL queries, dashboards, and alerting.
Python-based SOC tool for detecting SSH brute-force attacks from authentication logs with IP classification and mitigation suggestions.
Brute force attack detection using SSH logs and Fail2Ban with real-world simulation and mitigation.
Python script to detect brute force SSH login attempts from raw logs
Real-time Linux server security dashboard — beautiful TUI with attack maps, gauges, and sparklines. Built in Rust. Zero dependencies. cargo install vigil
Java login system with brute-force protection and attempt logging.
Automated cybersecurity log analysis and alert system using Termux and Python — Google Certified hands-on project with SIEM, threat detection, and Blue Team tools.
A command-line log analyzer written in C that detects brute-force login attempts by analyzing failed authentication logs.
Authentication log analysis tool for security assessment
🛡️ Lightweight Linux security metrics agent — deep procfs telemetry, kernel hardening audit, forensic detection, auth intelligence, and an embedded real-time analytics dashboard. Single binary. ~2MB RAM. Prometheus-native.
CLI log anomaly detector for auth and web server logs — detects brute force, privilege escalation, and scanner behavior
Advanced RDP Login Monitoring & Alert System built with Python. Detects, analyzes, and alerts suspicious Remote Desktop login attempts in real-time using Windows Event Logs. Designed for cybersecurity monitoring, SOC operations, and threat detection.
The objective of this project is to design and implement a Splunk dashboard for monitoring SSH authentication activity on Linux servers.
Python script to detect failed logins and suspicious IP behaviour in Apache logs. SOC Analyst training project.
Mini SOC lab: Wazuh SIEM + Suricata IDS + Elastic Stack in Docker. Detects SSH brute-force & port scans with automated alerts and Kibana dashboard.
Add a description, image, and links to the brute-force-detection topic page so that developers can more easily learn about it.
To associate your repository with the brute-force-detection topic, visit your repo's landing page and select "manage topics."