crossroadsfpga / pigasusLinks
100Gbps Intrusion Detection and Prevention System
☆681Updated 10 months ago
Alternatives and similar repositories for pigasus
Users that are interested in pigasus are comparing it to the libraries listed below
Sorting:
- Red Team K8S Adversary Emulation Based on kubectl☆820Updated 4 years ago
- NFStream: a Flexible Network Data Analysis Framework.☆1,156Updated 10 months ago
- pktvisor is a dynamic network observability agent that smartly analyzes network traffic and generates opentelemetry metrics☆505Updated 2 weeks ago
- A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.☆1,335Updated last year
- Mercury: network metadata capture and analysis☆462Updated 3 weeks ago
- Tenzir is the data pipeline engine for security teams.☆684Updated this week
- Attack Surface Management since before Attack Surface Management was a thing☆645Updated 2 weeks ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆432Updated 2 weeks ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,143Updated this week
- A framework for secure and scalable network traffic analysis - https://netcap.io☆1,751Updated last year
- Graph platform for Detection and Response☆694Updated 2 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆1,222Updated 2 years ago
- Advanced Honeypot framework.☆1,264Updated last year
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,313Updated last year
- hBPF = eBPF in hardware☆416Updated 2 years ago
- Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.☆1,848Updated last week
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆680Updated 2 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,270Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated last month
- This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.☆910Updated this week
- ☆319Updated 3 years ago
- ☆561Updated 2 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆672Updated last year
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- FastClick - A faster version of the Click Modular Router featuring batching, advanced multi-processing and improved Netmap and DPDK suppo…☆294Updated last month
- Batfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configu…☆1,252Updated this week
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆459Updated 3 weeks ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,190Updated 6 months ago
- The Stateful Traffic Generator for Layer 1 to Layer 7☆435Updated 2 years ago