Network visualizer tool built using Processing
☆24Jun 23, 2021Updated 4 years ago
Alternatives and similar repositories for Network-Visualization-Project
Users that are interested in Network-Visualization-Project are comparing it to the libraries listed below
Sorting:
- This plugins repository is an unofficial library of decoders for Dshell, the U.S. Army Research Lab's network forensic analysis framework…☆27Jun 20, 2016Updated 9 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Oct 25, 2019Updated 6 years ago
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 2 months ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- It is a platform to use multiprocess to combine dpdk and libnids together to support analyse packets in 10G port.☆39Nov 19, 2014Updated 11 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Tranalyzer generates extended netflow-like flow statistics from large pcap files or extensive ethernet interface measurements. It is inte…☆18Nov 14, 2018Updated 7 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23May 6, 2016Updated 9 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- Dockerized Apache Druid for testing and development☆24Jan 24, 2020Updated 6 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- A mapping of used malware names to commonly known family names☆62Feb 21, 2023Updated 3 years ago
- tcp reassembly☆28Feb 15, 2022Updated 4 years ago
- Useful commands for infosec☆29Feb 13, 2023Updated 3 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- Translate STIX 2 Patterning Queries☆31Oct 4, 2018Updated 7 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆97Jan 8, 2026Updated last month
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆33Nov 3, 2025Updated 3 months ago
- A flow-based network monitor with Deep Packet Inspection☆29Oct 27, 2016Updated 9 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆80Dec 8, 2022Updated 3 years ago
- Set of Yara rules for finding files using magics headers☆142Sep 8, 2020Updated 5 years ago
- Real-time Packet Observation Tool☆39Sep 26, 2023Updated 2 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- ☆38Nov 20, 2025Updated 3 months ago
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- Analyze a large dataset containing website users data (Google Analytics data) from the Google Merchandise Store, a real ecommerce store. …☆10Oct 14, 2019Updated 6 years ago
- This is a advanced ransomware example made in AutoIt☆34May 22, 2016Updated 9 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆35Mar 5, 2016Updated 9 years ago