Top 15 AIDE Alternative and Similar Softwares | Apr 2024

AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker.

It creates a database from the regular expression rules that it finds from the config file(s). Once this database is initialized it can be used to verify the integrity of the files. It has several message digest algorithms (see below) that are used to check the integrity of the file. All of the usual file attributes can also be checked for inconsistencies. It can read databases from older or newer versions. ...

1. Samhain

Samhain The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes.Samhain been designed to monitor multiple hosts with potentially different operating systems, providing centralized logging and maintenance, although it can also......

2. Mugsy

Mugsy Mugsy is a Linux file integrity monitor. It runs as a daemon and any file modifications made to your system on directories you've specify to monitor are logged locally and optionally sent to your elasticsearch server(s).......

3. ModSecurity

ModSecurity ModSecurity is an open source web application firewall. Working embedded in the web server, or standalone as a network appliance, it detects and prevents attacks against web applications.......

4. SSHGuard

SSHGuard Sshguard monitors services through their logging activity. It reacts to messages about dangerous activity by blocking the source address with the local firewall. Sshguard employs a clever parser that can transparently recognize several logging formats at once (syslog, syslog-ng, metalog, multilog, raw messages), and detects attacks for many services out......

5. Snare Server

Snare Server The Snare Server, from InterSect Alliance, is a proprietary Log Monitoring solution that builds on the open source Snare agents to provide a central audit event collection, analysis, reporting and archival system.Full source code and documentation is provided with this product, allowing InterSect Alliance partners, or your internal security team,......

6. Barricade

Barricade We thought security products were too complex, difficult to use and inaccessible - so we set out to build the most simple, human and intuitive security product ever made. In other words the kind of security product we want for ourselves. At its core Barricade works like an early warning......

7. syschangemon

syschangemon syschangemon - system change monitorPeriodically collects system configuration (eg. conffiles in /etc, binary files in /sbin, etc.) for changes, it can even run external commands and store their stdout and stderr for change monitoring.This can be useful as a HIDS (host based intrusion detection system) as well as in a......

8. GeoSure

GeoSure Your new best friend and safety guide. Learn how GeoSure's sophisticated analytics engine & community can help you stay safe. Amazing tool for every traveller.......

9. PersonalLife

PersonalLife PersonalLife Protects Smartphone Users’ Private DataPersonalLife is an app to help iPhone and Android users protect their personal information against the prying eye. PersonalLife securely encrypts user’s photos, videos, contacts, passwords and many other types of data. Unlike competing solutions, PersonalLife enables full cloud sync of encrypted information via the......

10. Refuge Restrooms

Refuge Restrooms REFUGE finds safe restrooms for transgender, intersex, and gender nonconforming individuals.Features:- Tap a map pin to see......

11. Suricata

Suricata Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors. Suricata is a fork of snort.......

12. Arpwatch

Arpwatch arpwatch is a computer software tool for monitoring Address Resolution Protocol traffic on a computer network. It generates a log of observed pairing of IP addresses with MAC addresses along with a timestamp when the pairing appeared on the network. It also has the option of sending an email to......

13. GFI EventsManager

GFI EventsManager GFI EventsManager assists with monitoring and managing event logs, maintaining network health and security while also helping you to comply with various regulations and acts including SOX, PCI DSS, Code of Connection, HIPAA, data protection laws and others. This award-winning solution automatically processes and archives event logs, collecting the information......

14. snort

snort Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and nearly 400,000 registered users, Snort has become the de facto standard for......

15. LifeWay Worship

LifeWay Worship Plan worship, download and play Christian sheet music and accompaniment tracks for praise and worship songs, contemporary versions of hymns, and praise choruses. Choose from PowerPoint presentations, chord charts, lead sheets, praise band orchestrations and audio tracks for every size church.......