A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.
☆1,358Apr 1, 2024Updated 2 years ago
Alternatives and similar repositories for joy
Users that are interested in joy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mercury: network metadata capture and analysis☆504Mar 21, 2026Updated 3 weeks ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,371Sep 3, 2025Updated 7 months ago
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆3,084May 1, 2025Updated 11 months ago
- TLS Fingerprinting☆399Oct 20, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,347Updated this week
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,561Updated this week
- Deep Learning models for network traffic classification☆764Jan 30, 2026Updated 2 months ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆80Sep 13, 2023Updated 2 years ago
- Malicious traffic detection system☆8,371Updated this week
- Malcom - Malware Communications Analyzer☆1,169Nov 29, 2017Updated 8 years ago
- ☆520Jan 26, 2021Updated 5 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆451Mar 19, 2026Updated 3 weeks ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Aug 14, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Stenographer is a packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of…☆1,800Jul 26, 2021Updated 4 years ago
- A simple, cross-platform utility to classify packets into flows using only the essential 4-tuple.☆177Aug 12, 2025Updated 7 months ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,999Updated this week
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 3 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆547May 1, 2025Updated 11 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Loki - Simple IOC and YARA Scanner☆3,742Jan 12, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,737May 28, 2024Updated last year
- Builds malware analysis Windows VMs so that you don't have to.☆1,043Aug 23, 2021Updated 4 years ago
- Encrypted Traffic classification☆17Jan 5, 2020Updated 6 years ago
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,429Nov 16, 2023Updated 2 years ago
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- Open Source Deep Packet Inspection Software Toolkit☆4,411Updated this week
- NetRipper - Smart traffic sniffing for penetration testers☆1,390Jun 17, 2022Updated 3 years ago
- Encrypted Traffic Classification using Deep Learning☆50Mar 27, 2026Updated 2 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- Fast Incident Response☆2,002Updated this week
- Laika BOSS: Object Scanning System☆751Dec 16, 2024Updated last year
- ☆305May 28, 2017Updated 8 years ago
- Machinae Security Intelligence Collector☆540May 15, 2024Updated last year
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆194Sep 23, 2024Updated last year
- Network traffic classification library that requires minimal application payload☆218Aug 13, 2024Updated last year