Tranalyzer generates extended netflow-like flow statistics from large pcap files or extensive ethernet interface measurements. It is intended to serve as a tool for IT troubleshooting, encrypted traffic mining and forensic analysis.
☆18Nov 14, 2018Updated 7 years ago
Alternatives and similar repositories for tranalyzer2
Users that are interested in tranalyzer2 are comparing it to the libraries listed below
Sorting:
- tcp reassembly☆28Feb 15, 2022Updated 4 years ago
- ☆10Feb 10, 2020Updated 6 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Dockerized Apache Druid for testing and development☆24Jan 24, 2020Updated 6 years ago
- Network visualizer tool built using Processing☆24Jun 23, 2021Updated 4 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- You're busted!☆27Dec 16, 2019Updated 6 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆33Nov 3, 2025Updated 3 months ago
- A flow-based network monitor with Deep Packet Inspection☆29Oct 27, 2016Updated 9 years ago
- Real-time Packet Observation Tool☆39Sep 26, 2023Updated 2 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Sep 16, 2024Updated last year
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- ☆32Nov 17, 2017Updated 8 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- Code and slides for a workshop I'm hosting on Python and its useful data-processing/machine learning capabilities.☆37Oct 7, 2015Updated 10 years ago
- It is a platform to use multiprocess to combine dpdk and libnids together to support analyse packets in 10G port.☆39Nov 19, 2014Updated 11 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- A WeChat (and Weixin) chatbot skeleton in Python with queue/delayed messages support.☆12Jan 12, 2026Updated last month
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- A file system to transparently read RAR files by representing them as directories.☆11Dec 31, 2017Updated 8 years ago
- Tool to identify domains containing Pinyin language☆12Oct 18, 2014Updated 11 years ago
- Kibana 4 Templates for Suricata IDPS☆33Jul 28, 2016Updated 9 years ago
- A package manager for Zeek☆47Jan 8, 2026Updated last month
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- Windows desktop application for control of SD-OCT imaging systems☆11Oct 20, 2025Updated 4 months ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- A lightweight PDF library optimized for metadata extraction and insertion☆14Jun 2, 2017Updated 8 years ago