pcapdjpcapdj - dispatch pcap files
Stars: ✭ 41 (-87.72%)
gonidsgonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that you can join on Google Groups: https://groups.google.com/forum/#!topic/gonids/
Stars: ✭ 140 (-58.08%)
testmynids.orgA website and framework for testing NIDS detection
Stars: ✭ 55 (-83.53%)
network-pipelineNetwork traffic data pipeline for real-time predictions and building datasets for deep neural networks
Stars: ✭ 36 (-89.22%)
ScapyScapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+1975.45%)
IvreNetwork recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+597.9%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-88.62%)
CyberscanCyberScan: Network's Forensics ToolKit
Stars: ✭ 280 (-16.17%)
NfstreamNFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+86.23%)
Train Ai With Django Swagger JwtTrain AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Stars: ✭ 66 (-80.24%)
ivreNetwork recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+711.98%)
Dynamite NsmDynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat detection
Stars: ✭ 92 (-72.46%)
BatfishBatfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
Stars: ✭ 592 (+77.25%)
DPDK SURICATA-4 1 1dpdk infrastructure for software acceleration. Currently working on RX and ACL pre-filter
Stars: ✭ 81 (-75.75%)
CANopen-monitorAn NCurses-based TUI application for tracking activity over the CAN bus and decoding messages with provided EDS/OD files.
Stars: ✭ 15 (-95.51%)
susanowThread based NFVi on DPDK
Stars: ✭ 27 (-91.92%)
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-82.93%)
kubernetes-iperf3Simple wrapper around iperf3 to measure network bandwidth from all nodes of a Kubernetes cluster
Stars: ✭ 80 (-76.05%)
EveboxWeb Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search
Stars: ✭ 286 (-14.37%)
rpcapd-linuxrpcapd utility modified to compile under linux
Stars: ✭ 68 (-79.64%)
opensnitchOpenSnitch is a GNU/Linux application firewall
Stars: ✭ 398 (+19.16%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-93.71%)
dynetxDynamic Network Analysis library
Stars: ✭ 75 (-77.54%)
pdns-qofPassive DNS Common Output Format
Stars: ✭ 30 (-91.02%)
Hack-UtilsScript to facilitate different functions and checks
Stars: ✭ 27 (-91.92%)
signnetR package for signed networks
Stars: ✭ 19 (-94.31%)
JupiterJupiter is a high-performance 4-layer network load balance service based on DPDK.
Stars: ✭ 292 (-12.57%)
PoseidonPoseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a number of machine learning techniques. The machine learning algorithms classify and predict the type of device.
Stars: ✭ 310 (-7.19%)
LagopusYet another SDN / OpenFlow software switch
Stars: ✭ 281 (-15.87%)
SocMapSocial Mapping Framework for Twitter
Stars: ✭ 16 (-95.21%)
egorR Package for importing and analysing ego-centered-network data.
Stars: ✭ 17 (-94.91%)
NetStalkerA network tool to control the bandwidth over your local network.
Stars: ✭ 69 (-79.34%)
brimcapConvert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)
Stars: ✭ 22 (-93.41%)
Frontendwingman Frontend Wingman, Learn frontend faster!
Stars: ✭ 315 (-5.69%)
aera-workshopThis workshop introduces participants to the Learning Analytics (LA), and provides a brief overview of LA methodologies, literature, applications, and ethical issues as they relate to STEM education.
Stars: ✭ 14 (-95.81%)
qperfqperf is a performance measurement tool for QUIC similar to iperf
Stars: ✭ 31 (-90.72%)
infomap ecology packagePackage with functions to handle network data and run Infomap, inspired by ecological networks
Stars: ✭ 14 (-95.81%)
WhatwebNext generation web scanner
Stars: ✭ 3,503 (+948.8%)
sflow-collectorA Python class for parsing sFlow packets.
Stars: ✭ 16 (-95.21%)
pycommunityidA Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (-94.61%)
Containerdnsa fast DNS for Kubernetes clusters
Stars: ✭ 321 (-3.89%)
altprobecollector for XDR and security posture service
Stars: ✭ 62 (-81.44%)
LNTopologyA tool to analyze the topology of Bitcoin's Lightning Network
Stars: ✭ 19 (-94.31%)
DEMONDEMON: a local-first discovery method for overlapping communities.
Stars: ✭ 26 (-92.22%)
tariqHybrid Port Knocking System
Stars: ✭ 20 (-94.01%)
flownetworkA python package for flow network analysis
Stars: ✭ 22 (-93.41%)
upf-epc4G/5G Mobile Core User Plane
Stars: ✭ 97 (-70.96%)
BGP-RankingBGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)
Stars: ✭ 49 (-85.33%)
sriov-cniDPDK & SR-IOV CNI plugin
Stars: ✭ 209 (-37.43%)
FpndPython package for freepn network daemon
Stars: ✭ 271 (-18.86%)
what-vpnIdentify servers running various SSL VPNs based on protocol-specific behaviors
Stars: ✭ 24 (-92.81%)
f1-communitiesA novel approach to evaluate community detection algorithms on ground truth
Stars: ✭ 20 (-94.01%)
aflnwAFLNW: network wrapper for AFL
Stars: ✭ 21 (-93.71%)
avainA Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (-83.23%)