firewalla
opencti
firewalla | opencti | |
---|---|---|
67 | 9 | |
526 | 4,718 | |
1.3% | 3.9% | |
9.9 | 10.0 | |
4 days ago | about 22 hours ago | |
JavaScript | TypeScript | |
GNU Affero General Public License v3.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
firewalla
- Home Lab Guide
-
would FW software run on a device like this?
firewalla is open source https://github.com/firewalla/firewalla
-
Firewalla Advice for a small business
Just to follow up because I think I misread OP—they’re looking at Firewalla who publishes their source on github, and it looks a lot like your classic FOSS firewall running suricata and probably doing DNS-based filtering. I bet if you dig into their source you’ll find dnscryptproxy, unbound, or dnsmasq with filter sets.
-
Does the VPN client terminate "inside/behind" the firewall or in front of it?
Using the Firewalla VPN Client for a 3rd party connection is one way. What this means is that devices on your network can initiate connections through the VPN to external addresses, and those external addresses can respond and make use of the established connection (ex: your machine uses a browser to request the webpage https://help.firewalla.com through the vpn connection, and the server hosting the webpage receives the request and is able to respond, by sending the requested webpage)
- Manage rules with command line
-
Best way to use Pi-Hole while utilizing all the FWG features
search https://help.firewalla.com you will find more articles on this topic. And if not, the communitly likely have more https://help.firewalla.com/hc/en-us/community/topics/360001948014-Expanding-Firewalla-Docker-Third-Party-Apps-Scripts-
-
Configuring TP Link Omada Controller docker container
there are a few threads https://help.firewalla.com like this https://help.firewalla.com/hc/en-us/community/posts/4411622449811-Omada-Controller-Docker
-
Feature Request: CrowdSec
From my understanding zeek does the inspection (probably not https / tls ) and generates alerts (internally) which Firewallas software (https://github.com/firewalla/firewalla) picks up and analyses then throws out alerts / blocks as they see fit.
- Any way to use the Firewalla license from my device which was stolen?
-
Software
Technically yes, but also maybe no. Firewalla's software is open source. You can download and modify it on GitHub. If you really wanted to, you could fork it and strip out all of the firewalla-specific code (ie licensing, app integration, etc.) and replace it with your own code.
opencti
- GitHub - OpenCTI-Platform/opencti: Open Cyber Threat Intelligence Platform
-
Creating a cyber threat intelligence tool
It sounds like you want to jump into game development before learning how to write "Hello, world!". Try using any of the open source tools that already do this and sign up for some "free" threat intel tools and learn the lay of the land. https://www.misp-project.org/ https://github.com/OpenCTI-Platform/opencti https://iplists.firehol.org/ https://www.greynoise.io/
-
Threat analysis visualization?
An image - OpenCTI IOC Visualisation The system - OpenCTI Github
-
Cyber Threat Intelligence
Best thing you can do to start your CTI journey is building an OpenCTI server for yourself. After adding some connectors to your openCTI (AlienVault, malpedia, mitre...), you'll have a strong base to practice and learn CTI.
- OpenCTI - Open platform for cyber threat intelligence
-
Threat Intelligence platform recommendations
If you haven’t yet, check out OpenCTI https://github.com/OpenCTI-Platform/opencti
- OpenCTI-Platform/opencti - Open Cyber Threat Intelligence Platform
- OpenCTI Version 4.5.4 released
- OpenCTI: Release Version 4.5.0 - more filters are available in the TAXII collection API
What are some alternatives?
RPi-Monitor - Real time monitoring for embedded devices
MISP - MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface
deepdarkCTI - Collection of Cyber Threat Intelligence sources from the deep and dark web
Home-AssistantConfig - :house: Home Assistant configuration & Documentation for my Smart House. Write-ups, videos, part lists, and links throughout. Be sure to :star: it. Updated FREQUENTLY!
Shuffle - Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
nginx-proxy-manager-dns
CaptfEncoder - Captfencoder is opensource a rapid cross platform network security tool suite, providing network security related code conversion, classical cryptography, cryptography, asymmetric encryption, miscellaneous tools, and aggregating all kinds of online tools.
logger - ✔️ Simple, pretty and powerful logger for android
awesome-nodejs-security - Awesome Node.js Security resources
rpi-remotely-img - Customizing Raspberry Pi system image, so it's SSH available over the Internet on first boot.
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.