RSS 4 projects tagged "Packet Capturing"

Download Website Updated 07 Feb 2010 Open Unified Recording

Screenshot
Pop 44.86
Vit 39.21

Open Unified Recording (OUR) is a full featured Linux-based VoIP/SIP call recording engine, indexing, and retrieval system. The system resides on the network and passively captures SIP sessions.

No download Website Updated 09 Mar 2014 catnip

Screenshot
Pop 90.72
Vit 7.71

catnip is a tiny network packet mirroring tool. The server (source) is not based on libpcap and, when compiled and stripped, makes the binary smaller than 20kiB. This makes it very suitable for embedded environments where a libpcap-based tool, typically 100kiB for just libpcap and 500kiB for tcpdump, would be simply too large. What makes catnip stand out from other small packet capturing tools is that it presents the remote systems interface as a local TUN/TAP interface, but additionally can apply a BPF filter at the remote end to send to you only the traffic you are interested in.

No download No website Updated 01 Aug 2012 Ostinato

Screenshot
Pop 165.75
Vit 4.33

Ostinato is a network packet and traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. It features custom packet crafting with editing of any field for several protocols: Ethernet, 802.3, LLC SNAP, VLAN (with Q-in-Q), ARP, IPv4, IPv6, IP-in-IP a.k.a IP Tunneling, TCP, UDP, ICMPv4, ICMPv6, IGMP, MLD, HTTP, SIP, RTSP, NNTP, etc. It is useful for both functional and performance testing.

No download Website Updated 02 Oct 2013 Cyberprobe

Screenshot
Pop 72.17
Vit 2.56

Cyberprobe is a distributed architecture for real-time monitoring of networks against attack. The software consists of two components: cyberprobe, which collects data packets and forwards it over a network in standard streaming protocols; and cybermon, which receives the streamed packets, decodes the protocols, and interprets the information. Cyberprobe can optionally be configured to receive alerts from Snort. In this configuration, when an alert is received, the IP source address associated with the alert is dynamically targeted for a period of time. Collecting data and forwarding over the network to a central collection point allows for a much more "industrialized" approach to intrusion detection. The monitor, cybermon, is highly configurable using LUA, allowing you to do a great many things with captured data: summarize, hexdump, store, and respond with packet injections.

Screenshot

Project Spotlight

Seed7

An extendable programming language.

Screenshot

Project Spotlight

QuartzDesk

A Java Quartz scheduler management and monitoring UI/tool.