A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.
☆1,360Apr 1, 2024Updated 2 years ago
Alternatives and similar repositories for joy
Users that are interested in joy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mercury: network metadata capture and analysis☆506Apr 14, 2026Updated 2 weeks ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆3,378Sep 3, 2025Updated 7 months ago
- JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.☆3,093May 1, 2025Updated last year
- TLS Fingerprinting☆399Oct 20, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Arkime is an open source, large scale, full packet capturing, indexing, and database system.☆7,358Apr 23, 2026Updated last week
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,605Updated this week
- Deep Learning models for network traffic classification☆766Jan 30, 2026Updated 3 months ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆80Sep 13, 2023Updated 2 years ago
- Malcom - Malware Communications Analyzer☆1,168Nov 29, 2017Updated 8 years ago
- Malicious traffic detection system☆8,412Updated this week
- ☆520Jan 26, 2021Updated 5 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆456Mar 19, 2026Updated last month
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Aug 14, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Stenographer is a packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of…☆1,800Jul 26, 2021Updated 4 years ago
- A simple, cross-platform utility to classify packets into flows using only the essential 4-tuple.☆177Aug 12, 2025Updated 8 months ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆4,007Updated this week
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 3 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆548May 1, 2025Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆824Nov 3, 2017Updated 8 years ago
- Loki - Simple IOC and YARA Scanner☆3,748Jan 12, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,738May 28, 2024Updated last year
- Builds malware analysis Windows VMs so that you don't have to.☆1,044Aug 23, 2021Updated 4 years ago
- Encrypted Traffic classification☆17Jan 5, 2020Updated 6 years ago
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,431Nov 16, 2023Updated 2 years ago
- Attack Detection☆1,359Aug 31, 2022Updated 3 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,391Jun 17, 2022Updated 3 years ago
- Open Source Deep Packet Inspection Software Toolkit☆4,446Updated this week
- Encrypted Traffic Classification using Deep Learning☆50Mar 27, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 16,432 Free Yara rules created by☆388Jun 1, 2019Updated 6 years ago
- Fast Incident Response☆2,007Updated this week
- Laika BOSS: Object Scanning System☆750Dec 16, 2024Updated last year
- ☆305May 28, 2017Updated 8 years ago
- Machinae Security Intelligence Collector☆540May 15, 2024Updated last year
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆194Sep 23, 2024Updated last year
- An analytical framework for network traffic and behavioral analytics☆457Dec 7, 2022Updated 3 years ago