RSS 27 projects tagged "Network Analysis"

Download Website Updated 25 Mar 2014 Suricata

Screenshot
Pop 922.54
Vit 55.27

Suricata is an Intrusion Detection and Prevention (IDS/IPS) engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support, file extraction capabilities, and many more features. It's capable of loading existing Snort rules and signatures, and supports many frontends through Barnyard2.

No download Website Updated 13 Apr 2014 Why Can't I Connect?

Screenshot
Pop 492.83
Vit 23.09

"Why Can't I Connect?" makes it easier to resolve TCP/IP connection errors. Use it to diagnose connections to common server types and create generic clients and/or servers.

No download No website Updated 14 Oct 2013 JunkieTheSniffer

Screenshot
Pop 168.58
Vit 11.45

Junkie is a real-time packet sniffer and analyzer. It is modular enough to accomplish many different tasks. It can be a helpful companion to the modern network administrator and analyst. Compared to previously available tools, junkie lies in between tcpdump and wireshark. Unlike tcpdump, its purpose is to parse protocols of any depth; unlike wireshark, though, it is designed to analyze traffic in real-time and so cannot parse traffic as exhaustively as wireshark does. In addition, its design encompasses extendability and speed. It has a plug-in system and high-level extension language that eases the development and combination of new functionalities; threaded packet capture and analysis for handling of high bandwidth networks; and a modular architecture to ease the addition of any protocol layer. It is based on libpcap for portability, and well-tested on professional settings.

No download Website Updated 03 Mar 2011 RedWolf Security Threat Generator

Screenshot
Pop 140.91
Vit 2.47

RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.

Download Website Updated 15 Dec 2011 mcl-edge

Screenshot
Pop 119.50
Vit 6.31

MCL-edge is an integrated command-line driven workbench for large scale network analysis. It includes programs for the computation of shortest paths, diameter, clustering coefficient, betweenness centrality, and network shuffles. A module for loading and analyzing gene expression data as a network is provided. The MCL algorithm is a fast and highly scalable cluster algorithm for networks based on stochastic flow. The flow process employed by the algorithm is mathematically sound and intrinsically tied to cluster structure, which is revealed as the imprint left by the process. The threaded implementation has handled networks with millions of nodes within hours and is widely used in the fields of bioinformatics, graph clustering, and network analysis.

Download Website Updated 18 Feb 2012 Multi Threaded TCP Port Scanner

Screenshot
Pop 95.06
Vit 3.18

Multi Threaded TCP Port Scanner allows you to scan 65535 TCP ports on an IP address. You can specify how many threads to run and the timeout. Furthermore, it will tell you the MAC address of the target and the services that are running. You can scan IP addresses on your network and find out which open ports you have.

No download No website Updated 15 Apr 2013 Nova: Network Anti-Reconnaissance Tool

Screenshot
Pop 93.88
Vit 1.96

Nova is a software application for preventing and detecting hostile network reconnaissance (such as nmap scans). It does this by first creating the Haystack: a large collection of low interaction honeypots using an updated version of Honeyd. Finding real machines on the network becomes like finding a needle in a haystack of fake machines. Second, Nova uses machine learning algorithms to automatically detect and classify attempts at hostile reconnaissance, so there's no need to go searching manually through your honeypot's log files. It provides an easy to use Web-based interface powered by Node.js to configure itself and Honeyd instances.

Download Website Updated 25 Oct 2010 gbRRDGraphix

Screenshot
Pop 71.05
Vit 2.20

gbRRDGraphix is a graphical user interface that allows one to use RRDTool commands and "flow-tools" Netflow utilities easily. The project includes a scheduler to update the RRDTool database and a complete Web site to display all RRDtool graphics.

Download No website Updated 01 Jan 2011 Chaosmap

Screenshot
Pop 66.57
Vit 1.42

Chaosmap is an information gathering tool and DNS, Whois, and Web server scanner. It can be used to look up DNS names with a dictionary with or without using a salt. Salting for DNS means it will append numbers from 1-9 to the name in the dictionary with or without a - and _ or a leading 0. Salting for Web stuff will try double slashes and some directory traversal tricks. It performs reverse DNS lookups of a whole IP range (with optional Whois lookup) and dictionary scans for hidden paths on one Web server or a range of IP addresses. Optionally you can encode a path with URL encoding use Google dict lookup mode to find the path on Google and only query the Webserver if there are no search results. It can also extract email addresses from domains using a Google search or perform a list of Google Hacking queries on your domain.

Download Website Updated 02 Apr 2010 Membrane SOAP/HTTP Monitor

Screenshot
Pop 49.30
Vit 1.42

Membrane Monitor is a tool to capture, display, and manipulate SOAP and HTTP messages. The monitor can work as an HTTP proxy or as a reverse HTTP proxy.

Screenshot

Project Spotlight

MathGL

A library for making high-quality scientific graphics.

Screenshot

Project Spotlight

Evo/Lution

A live Linux CD graphical Arch installer.