Xtract attempts to demonstrate how Wireshark's powerful network traffic analysis capabilities can be combined with the file carving capabilities of programs such as Foremost and NetworkMiner in a manner that is portable and extensible (hence the choice of Perl). Specifically, it offers: automated extraction of network stream sessions; visualization of networks via GraphViz; and integration of file carving capability. The scripts are intended as a proof-of-concept for how tedious tasks of reassembling TCP/UDP streams from network capture files and file carving based on these streams can be automated.
libsysactivity is a lightweight library that retrieves statistics of the system's activity in a portable and thread safe way. In each OS that it supports, it offers the same API for retrieving the activity of Hard disks, CPUs memory, Processes, Network interfaces, Memory, and Swaps.
MCL-edge is an integrated command-line driven workbench for large scale network analysis. It includes programs for the computation of shortest paths, diameter, clustering coefficient, betweenness centrality, and network shuffles. A module for loading and analyzing gene expression data as a network is provided. The MCL algorithm is a fast and highly scalable cluster algorithm for networks based on stochastic flow. The flow process employed by the algorithm is mathematically sound and intrinsically tied to cluster structure, which is revealed as the imprint left by the process. The threaded implementation has handled networks with millions of nodes within hours and is widely used in the fields of bioinformatics, graph clustering, and network analysis.
pyoui is a console Python program that lets you know which vendor has made an Ethernet/Bluetooth device. OUI stands for Organizationally Unique Identifier. In every electronic device that has a MAC address, the first (most weighted) 24 bits are the OUI, and they identify the vendor of that device. When you are sniffing network traffic, you may be interested in which network cards are active, or even if a MAC address is faked. This program is intended to help you with such things.