• Skip to primary navigation
  • Skip to content
  • Skip to footer
Running With Scissors
  • Home
  • About

    Where to next?

    • Cloud
    • Development
    • DFIR
    • GRC
    • Hardening
    • Hardware
    • Identity Access Management
    • IDS/IPS
    • Lock-picking
    • Misc
    • Mobile
    • Network
    • Pentesting
    • Reverse Engineering
    • Reporting
    • Radio Frequency
    • Social Engineering
    • SIEM
    • Tools
    • Web

    IDS/IPS

    What's on this page?

    • What is this about?

    What is this about?

    Probes, packet sniffing, Active response, self-healing, …, will end up here.

    Coming soon!
    

    Snort

    Suricata

    Wazuh

    Zeek

    • Feed
    © 2021 Running With Scissors. Powered by Jekyll & Minimal Mistakes.