A flow-based network monitor with Deep Packet Inspection
☆29Oct 27, 2016Updated 9 years ago
Alternatives and similar repositories for ndff
Users that are interested in ndff are comparing it to the libraries listed below
Sorting:
- NTOP nDPI Library example usage and FFI bindings for Lua, NodeJS☆13Jan 29, 2018Updated 8 years ago
- A KOP(Keen On Packet, 靠谱) DPI System which supports script rules which can describe behavior instead of application and performs triple s…☆17Jul 27, 2012Updated 13 years ago
- Locust.io Kubernetes Operator☆15Dec 2, 2020Updated 5 years ago
- Tranalyzer generates extended netflow-like flow statistics from large pcap files or extensive ethernet interface measurements. It is inte…☆18Nov 14, 2018Updated 7 years ago
- A project to demonstrate the tools power build a microservice platform with fully managed docker, serverless, CICD, IaaC, message queues,…☆15Jan 24, 2023Updated 3 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23May 6, 2016Updated 9 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- Go OAuth2 Client☆19Jun 23, 2025Updated 8 months ago
- Grafana dashboard for visualising GOLang runtime metrices using Prometheus for DC based GOLang services☆23May 24, 2020Updated 5 years ago
- Query your data using an intuitive Piped Processing Language (PPL)☆22May 10, 2023Updated 2 years ago
- Linux kernel Transport Layer Security module☆25Apr 26, 2016Updated 9 years ago
- tcp reassembly☆28Feb 15, 2022Updated 4 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- A protobuf plugin to generate parquet schemas.☆13Mar 9, 2022Updated 3 years ago
- ☆12Aug 17, 2022Updated 3 years ago
- Bridge between OTel and KEDA api☆12Updated this week
- Gzip decoder in Rust☆10May 14, 2017Updated 8 years ago
- 极验验证码☆11Sep 20, 2018Updated 7 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- ☆12May 30, 2019Updated 6 years ago
- [pt-BR] Um guia interativo sobre confiança, usando teoria dos jogos☆33Nov 27, 2021Updated 4 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Jul 10, 2025Updated 7 months ago
- ☆10Feb 23, 2025Updated last year
- Modified chesterish Jupyter theme with larger font and Iosevka webfont☆10Nov 25, 2017Updated 8 years ago
- Postfix Add-on for Splunk (Compliant with the Mail CIM model)☆11Mar 18, 2021Updated 4 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- ☆10Jun 22, 2025Updated 8 months ago
- Raft consensus algorithm toy project☆10Aug 10, 2020Updated 5 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Interval Treeset based on finger trees☆11Oct 28, 2020Updated 5 years ago
- A Kafka mirroring service based on Akka Streams Kafka☆10Jan 30, 2022Updated 4 years ago
- Docker files for Yardstick Framework.☆10May 22, 2015Updated 10 years ago
- ☆15Feb 25, 2026Updated last week
- Hook sendto to get the target IP address☆10Apr 24, 2013Updated 12 years ago