varchashva / LetsMapYourNetworkLinks
Lets Map Your Network enables you to visualise your physical network in form of graph with zero manual error
☆459Updated 4 years ago
Alternatives and similar repositories for LetsMapYourNetwork
Users that are interested in LetsMapYourNetwork are comparing it to the libraries listed below
Sorting:
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆172Updated 2 years ago
- Visualize network topologies and collect graph statistics based on pcap files☆355Updated 2 years ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆679Updated 2 years ago
- Open Source SIEM (Security Information and Event Management system).☆219Updated 2 years ago
- PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform☆637Updated 3 weeks ago
- AI-based, context-driven network device ranking☆302Updated 2 years ago
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆506Updated last year
- DejaVU - Open Source Deception Framework☆424Updated 6 months ago
- Sguil client for NSM☆222Updated last year
- scan & visualize subnets☆73Updated 8 years ago
- Cisco Config Analysis Tool☆465Updated 2 years ago
- Passive Real-time Asset Detection System☆249Updated last year
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆247Updated 3 weeks ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆457Updated 2 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- Snort + Barnyard2 + Pulledpork → The easy way!☆170Updated 4 years ago
- a network packet capture compiler☆205Updated 3 years ago
- Super Next generation Advanced Reactive honEypot☆476Updated last year
- Network share sniffer and auto-mounter for crawling remote file systems☆212Updated 3 years ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆206Updated 2 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆658Updated 2 weeks ago
- Elasticsearch for Offensive Security☆139Updated 5 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆87Updated 4 years ago
- Blue Team Scripts☆253Updated 6 years ago
- He who flays the hide☆231Updated last year
- Scirius is a web application for Suricata ruleset management and threat hunting.☆675Updated last month
- Suricata IDS/IPS log analytics using the Elastic Stack.☆241Updated 4 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆545Updated 9 months ago