Ingesting, pipelining, and enhancing your DNS logs with usage indicators, security analysis, and additional metadata.
-
Updated
May 25, 2024 - Go
Ingesting, pipelining, and enhancing your DNS logs with usage indicators, security analysis, and additional metadata.
PcapPlusPlus is a multiplatform C++ library for capturing, parsing and crafting of network packets. It is designed to be efficient, powerful and easy to use. It provides C++ wrappers for the most popular packet processing engines such as libpcap, Npcap, WinPcap, DPDK, AF_XDP and PF_RING.
Comfortably monitor your Internet traffic 🕵️♂️
Network traffic analysis tool for Attack & Defense CTF's
Python-based Comprehensive Network Packet Analysis Library
Open source security data pipelines.
Scapy: the Python-based interactive packet manipulation program & library.
A network forensics and sniffer tool
Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors in the network traffic. Stratosphere Laboratory, AIC, FEL, CVUT in Prague.
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Arkime is an open source, large scale, full packet capturing, indexing, and database system.
⭐ ⭐ Use ML to classify flows and packets as benign or malicious. ⭐ ⭐
A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.
Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)
Process-aware, eBPF-based tcpdump
Add a description, image, and links to the pcap topic page so that developers can more easily learn about it.
To associate your repository with the pcap topic, visit your repo's landing page and select "manage topics."