maltrail
metadata
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
maltrail
-
Maltrail: Malicious traffic detection system
I just wanted to tell you about Maltrail (https://github.com/stamparm/maltrail/).
-
Is Maltrait worth the trouble?
Yes, MT had OOM on *BSD, because of python-pcapy module, which is currently unmaintained. So, the fork was done and python-pcapy-ng becomes actual module for MT, which fixed OOM and now MT works OK for *BSD-line: [1] https://github.com/stamparm/maltrail/issues/19056 [2] https://github.com/stamparm/maltrail/issues/16710 [3] py-pcapy-ng on Fresh Ports: https://www.freshports.org/net/py-pcapy-ng/ Also /requirement.txt file was modified for MT to avoid installing python-pcapy instead of python-pcapy-ng: [4] https://github.com/stamparm/maltrail/commit/2aa2da5ba5c332ddd106020290926d1fdfd0f8b2 Despite on all it, some mass-medias keep saying that python-pcapy is required for MT to work. No, just python-pcapy-ng. "Given everything is now encrypted, does anyone know if it is still effective?" <-- IDS (MT is the IDS itself) is passive detection, it doesn't provide the prevention actions. MT can use blocking mechanism, they are describes for Linux: https://github.com/stamparm/maltrail/wiki/Miscellaneous#1-setting-up-maltrail-as-an-intrusion-prevention-system-ips . If some can describe mechanism for MT on *BSD-line, that would be nice. Anyway would be thankful, if you provide details on missing ransomware. Perhaps, it is needed to update network IoCs, if ransomware comprometation was via network. Thank you! "Are the signatures reasonably up to date?" <-- trying to be up-to-dated: https://github.com/stamparm/maltrail/commits/master
-
Low resource alternative to Security Onion
Security Onion is a suite of tools, but if you just want visibility into things happening on your perimeter with Fail2ban style mitigation check out MalTrail. https://github.com/stamparm/MalTrail
-
Having Problems Using Wire? That's Because Wire Domains Are Ending Up In NextDNS Threat Intelligence Blocklists!
The Threat Intelligence Feeds have multiple upstream sources, see https://github.com/nextdns/metadata/blob/master/security/threat-intelligence-feeds.json. In this case, Maltrail Blacklist seems to have included this domain. You can report this directly to that maintainer here: https://github.com/stamparm/maltrail/issues
-
How do you run self-hosted software?
last docker discovery : maltrail (https://github.com/stamparm/maltrail , about to be moved from VM to docker)
metadata
- Threat Intelligence Feeds
-
Internet Archive (archive.org) blocked
Which list is blocking archive.org? If "NextDNS Ads & Trackers Blocklist", probably some kind of mistake, write about it - https://github.com/nextdns/metadata/issues
-
NextDNS - Are their lists public to use in Pihole?
You can find the NextDNS lists here: https://github.com/nextdns/metadata
-
Is NextDNS alive?
You can always look at github. This is just the activity for their metadata repo: https://github.com/nextdns/metadata/commits/masterFeel free to check their other repos.
- Threat intelligence feed, why blocked?
-
Next DNS doesn't respond to any help issues.
NextDNS gives you a whole bunch of 3rd party filters, maintained by random dudes in Github repos as a hobby. We support some of them too in the "3rd party filters" tab, however we don't encourage anyone to actually use them, as we have our own Native filters, that we've built up over the course of 5 years based on feedback for millions of Windscribe (our sister company) users. Our native filters are highly effective, and prone to much fewer false positives. We recommend you try them, you will be pleasantly surprised with how they perform. I guarantee you that you will spend 90% less time making whitelist rules for false blocks... or your money back :) "Native tracking protection" filters are all part of the IoT Filter. NextDNS has the individual toggles, which enforce this small set of rules. Out IoT filter enforces all of them, as well as 10x more things.
-
Problems with parental controls
Here is the list: https://github.com/nextdns/metadata/blob/master/parentalcontrol/categories/video-streaming.json
-
Ad blocking
Here's those native blocking lists from NextDNS: https://github.com/nextdns/metadata/tree/master/privacy/native
-
what happened to Energized ultimate?
From https://github.com/nextdns/metadata/blob/master/privacy/blocklists/energized-ultimate.json the link used is https://block.energized.pro/ultimate/formats/domains.txt which currently contains nothing but comments.
- SafeSearch Alternative Browsers
What are some alternatives?
Suricata - Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
blacklist - Blacklist and Adware Blocking for the Ubiquiti EdgeMax Router
Fail2Ban - Daemon to ban hosts that cause multiple authentication errors
NXEnhanced - Adds "quality-of-life" features to NextDNS website for a more practical usability
rpi-appliance-monitor - Device to monitor appliances that vibrate, such as clothes dryers or garage door openers
FTL - The Pi-hole FTL engine
community - Volatility plugins developed and maintained by the community
pihole-antitelemetry - A research-based starter pihole list to improve your privacy
hosts - 🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
blahdns - A small hobby ads block dns project with doh, dot, dnscrypt support.
MalConfScan - Volatility plugin for extracts configuration data of known malware
cname-trackers - This repository contains a list of popular CNAME trackers