A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.
☆1,354Apr 1, 2024Updated last year
Alternatives and similar repositories for joy
Users that are interested in joy are comparing it to the libraries listed below
Sorting:
- Mercury: network metadata capture and analysis☆498Feb 18, 2026Updated last week
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆679Oct 28, 2023Updated 2 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,361Sep 3, 2025Updated 5 months ago
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆3,070May 1, 2025Updated 10 months ago
- TLS Fingerprinting☆397Oct 20, 2020Updated 5 years ago
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,310Updated this week
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- Malicious traffic detection system☆8,251Updated this week
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆449Jan 16, 2024Updated 2 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,496Updated this week
- Malicious HTTP traffic explorer☆724Mar 16, 2023Updated 2 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,953Feb 20, 2026Updated last week
- ☆519Jan 26, 2021Updated 5 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆544May 1, 2025Updated 10 months ago
- Fast Incident Response☆1,995Feb 17, 2026Updated last week
- NetRipper - Smart traffic sniffing for penetration testers☆1,385Jun 17, 2022Updated 3 years ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,736May 28, 2024Updated last year
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- Stenographer is a packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of…☆1,801Jul 26, 2021Updated 4 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,428Nov 16, 2023Updated 2 years ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆80Sep 13, 2023Updated 2 years ago
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,083Dec 9, 2025Updated 2 months ago
- Laika BOSS: Object Scanning System☆751Dec 16, 2024Updated last year
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,362Updated this week
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆294Sep 30, 2023Updated 2 years ago
- Open Source Deep Packet Inspection Software Toolkit☆4,354Updated this week
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- 16,432 Free Yara rules created by☆390Jun 1, 2019Updated 6 years ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,850Nov 17, 2021Updated 4 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,516Jan 12, 2026Updated last month
- ☆173Jul 7, 2021Updated 4 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,715Sep 23, 2025Updated 5 months ago