RSS 26 projects tagged "Network Analysis"

Download Website Updated 25 Mar 2014 Suricata

Screenshot
Pop 922.74
Vit 53.03

Suricata is an Intrusion Detection and Prevention (IDS/IPS) engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support, file extraction capabilities, and many more features. It's capable of loading existing Snort rules and signatures, and supports many frontends through Barnyard2.

No download Website Updated 13 Apr 2014 Why Can't I Connect?

Screenshot
Pop 494.71
Vit 18.40

"Why Can't I Connect?" makes it easier to resolve TCP/IP connection errors. Use it to diagnose connections to common server types and create generic clients and/or servers.

No download No website Updated 01 Aug 2012 Ostinato

Screenshot
Pop 166.21
Vit 4.33

Ostinato is a network packet and traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. It features custom packet crafting with editing of any field for several protocols: Ethernet, 802.3, LLC SNAP, VLAN (with Q-in-Q), ARP, IPv4, IPv6, IP-in-IP a.k.a IP Tunneling, TCP, UDP, ICMPv4, ICMPv6, IGMP, MLD, HTTP, SIP, RTSP, NNTP, etc. It is useful for both functional and performance testing.

No download Website Updated 03 Mar 2011 RedWolf Security Threat Generator

Screenshot
Pop 139.66
Vit 2.47

RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.

Download Website Updated 15 Dec 2011 mcl-edge

Screenshot
Pop 120.43
Vit 6.31

MCL-edge is an integrated command-line driven workbench for large scale network analysis. It includes programs for the computation of shortest paths, diameter, clustering coefficient, betweenness centrality, and network shuffles. A module for loading and analyzing gene expression data as a network is provided. The MCL algorithm is a fast and highly scalable cluster algorithm for networks based on stochastic flow. The flow process employed by the algorithm is mathematically sound and intrinsically tied to cluster structure, which is revealed as the imprint left by the process. The threaded implementation has handled networks with millions of nodes within hours and is widely used in the fields of bioinformatics, graph clustering, and network analysis.

Download Website Updated 18 Feb 2012 Multi Threaded TCP Port Scanner

Screenshot
Pop 96.65
Vit 3.17

Multi Threaded TCP Port Scanner allows you to scan 65535 TCP ports on an IP address. You can specify how many threads to run and the timeout. Furthermore, it will tell you the MAC address of the target and the services that are running. You can scan IP addresses on your network and find out which open ports you have.

No download No website Updated 15 Apr 2013 Nova: Network Anti-Reconnaissance Tool

Screenshot
Pop 93.61
Vit 1.96

Nova is a software application for preventing and detecting hostile network reconnaissance (such as nmap scans). It does this by first creating the Haystack: a large collection of low interaction honeypots using an updated version of Honeyd. Finding real machines on the network becomes like finding a needle in a haystack of fake machines. Second, Nova uses machine learning algorithms to automatically detect and classify attempts at hostile reconnaissance, so there's no need to go searching manually through your honeypot's log files. It provides an easy to use Web-based interface powered by Node.js to configure itself and Honeyd instances.

Download Website Updated 25 Oct 2010 gbRRDGraphix

Screenshot
Pop 71.39
Vit 2.20

gbRRDGraphix is a graphical user interface that allows one to use RRDTool commands and "flow-tools" Netflow utilities easily. The project includes a scheduler to update the RRDTool database and a complete Web site to display all RRDtool graphics.

Download No website Updated 01 Jan 2011 Chaosmap

Screenshot
Pop 67.23
Vit 1.42

Chaosmap is an information gathering tool and DNS, Whois, and Web server scanner. It can be used to look up DNS names with a dictionary with or without using a salt. Salting for DNS means it will append numbers from 1-9 to the name in the dictionary with or without a - and _ or a leading 0. Salting for Web stuff will try double slashes and some directory traversal tricks. It performs reverse DNS lookups of a whole IP range (with optional Whois lookup) and dictionary scans for hidden paths on one Web server or a range of IP addresses. Optionally you can encode a path with URL encoding use Google dict lookup mode to find the path on Google and only query the Webserver if there are no search results. It can also extract email addresses from domains using a Google search or perform a list of Google Hacking queries on your domain.

Download Website Updated 02 Apr 2010 Membrane SOAP/HTTP Monitor

Screenshot
Pop 49.39
Vit 1.42

Membrane Monitor is a tool to capture, display, and manipulate SOAP and HTTP messages. The monitor can work as an HTTP proxy or as a reverse HTTP proxy.

Screenshot

Project Spotlight

Adagios

A Web-based Nagios configuration interface.

Screenshot

Project Spotlight

MathGL

A library for making high-quality scientific graphics.