"Deep Packet Inspection as a Service" (CoNEXT '14)
☆16Mar 30, 2017Updated 8 years ago
Alternatives and similar repositories for moly
Users that are interested in moly are comparing it to the libraries listed below
Sorting:
- I implement Firewall on SDN. I write some controller applications that work as Firewall and analyze incoming packets for each host. This…☆11Feb 27, 2017Updated 9 years ago
- A Deep Packet Inspection application that provides encrypted protocol recognition based on Machine Learning☆21Jun 18, 2018Updated 7 years ago
- Android driver for the Trusted Execution Environment <t-base☆12Sep 29, 2015Updated 10 years ago
- NTOP nDPI Library example usage and FFI bindings for Lua, NodeJS☆13Jan 29, 2018Updated 8 years ago
- Yet another hypervisor detection tool. Pure Ada 2005, supports Linux and FreeBSD☆18Nov 10, 2025Updated 4 months ago
- Extensible Service ChAin Prototyping Environment using Mininet, Click, NETCONF and POX☆11Mar 2, 2017Updated 9 years ago
- Artifacts for ATC '22 paper "Faster Software Packet Processing on FPGA NICs with eBPF Program Warping"☆17May 20, 2022Updated 3 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- OpenNebula Nodejs XMLRPC API client.☆17Dec 4, 2018Updated 7 years ago
- ☆16Feb 24, 2015Updated 11 years ago
- SD card bootloader for Ultimaker2☆13Mar 29, 2015Updated 10 years ago
- Set of research paper reading lists for SDN/OpenFlow related topics☆11Nov 24, 2015Updated 10 years ago
- GeoHash implementation for Neo4j graph database☆10Aug 10, 2015Updated 10 years ago
- Google Client Implementation in Scapy☆14Jun 26, 2018Updated 7 years ago
- Monitor logs (or any text files) and send alerts on specific changes.☆34Sep 27, 2023Updated 2 years ago
- Perfect hash fn generator☆15Sep 27, 2013Updated 12 years ago
- ☆27Mar 2, 2023Updated 3 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Jun 13, 2016Updated 9 years ago
- KVM-based virtual machine introspection for malware analysis☆29May 11, 2017Updated 8 years ago
- ☆13Feb 3, 2026Updated last month
- A tool to infer the security handshake state machine of a given WiFi router. Useful for vulnerability analysis☆15Oct 19, 2022Updated 3 years ago
- Binary translation in Rust☆13Jun 22, 2020Updated 5 years ago
- Linux Features for Safety-Critical Systems (LFSCS) to support ELISA charter to define and maintain a common set of elements, processes an…☆12Mar 3, 2026Updated 2 weeks ago
- Library for AMD SEV☆20Apr 1, 2022Updated 3 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 6 months ago
- Lab assignments for 6.826☆11Nov 8, 2019Updated 6 years ago
- MetaSync☆20Feb 23, 2016Updated 10 years ago
- Collection of scripts used for BlueField SoC system management.☆32Mar 13, 2026Updated last week
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- A reference implementation of FlyMon system.☆20Nov 13, 2022Updated 3 years ago
- Sharedb PubSub module based on ws-bus (websocket bus)☆10Jan 12, 2017Updated 9 years ago
- ☆36Jan 21, 2021Updated 5 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Simple PyTorch profiler that combines DeepSpeed Flops Profiler and TorchInfo☆12Feb 12, 2023Updated 3 years ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago