The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.
☆36Apr 16, 2026Updated this week
Alternatives and similar repositories for network-architecture-verification-and-validation
Users that are interested in network-architecture-verification-and-validation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A packet capture visualizer for industrial control networks.☆56Dec 4, 2023Updated 2 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Apr 5, 2026Updated 2 weeks ago
- Zeek Modbus Extension Scripts - CISA ICSNPP☆22Dec 16, 2025Updated 4 months ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Updated this week
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆46Jul 19, 2021Updated 4 years ago
- Darc Viewpoint (Cybersecurity Assets & Threats Modeling analysis)☆22Jan 20, 2026Updated 3 months ago
- Docker deployment configuration for Astral app - a GitHub stars organizer application with Laravel and PHP.☆13May 2, 2020Updated 5 years ago
- The New Windows Installer for FusionInventory Agent☆11Mar 3, 2022Updated 4 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 10 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆82Oct 25, 2017Updated 8 years ago
- Structured Threat Intelligence Graph