cisco / mercury
Mercury: network metadata capture and analysis
☆455Updated last month
Alternatives and similar repositories for mercury:
Users that are interested in mercury are comparing it to the libraries listed below
- A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.☆1,327Updated last year
- Network traffic classification library that requires minimal application payload☆212Updated 8 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆474Updated 3 months ago
- LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces.☆298Updated 2 weeks ago
- Application layer protocol identification of traffic flows☆222Updated 2 years ago
- Mirror of https://github.com/zeek/zeek☆174Updated 2 years ago
- p0f unofficial git repo☆489Updated 5 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆185Updated 2 years ago
- ☆27Updated 2 years ago
- Visualize network topologies and collect graph statistics based on pcap files☆349Updated 2 years ago
- SSL/TLS layers for scapy the interactive packet manipulation tool☆422Updated 3 years ago
- DPDK-based packet capture tool☆227Updated last year
- Python rewrite of passive OS fingerprinting tool☆172Updated 9 months ago
- Transparent SSL/TLS proxy for decrypting and diverting network traffic to other programs, such as UTM services, for deep SSL inspection☆416Updated 3 months ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆111Updated 3 years ago
- The tool for updating your Suricata rules.☆270Updated last week
- a network packet capture compiler☆198Updated 2 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- A simple utility to classify packets into flows. It's so simple that only one task is aimed to finish. For Deep Packet Inspection or flo…☆168Updated last year
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆177Updated 6 months ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆434Updated last year
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆539Updated last year
- TLS Fingerprinting☆385Updated 4 years ago
- Suspicious DGA from PDNS and Sandbox.☆183Updated 2 years ago
- Open Source Network Forensic Analysis Tool (NFAT)☆189Updated 4 years ago
- A fast parser for DNS pcap data.☆70Updated 8 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆453Updated last week
- System for network traffic analysis and anomaly detection.☆89Updated 5 months ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year
- Suricata Extreme Performance Tuning guide☆207Updated 7 years ago