varchashva / LetsMapYourNetworkLinks
Lets Map Your Network enables you to visualise your physical network in form of graph with zero manual error
☆452Updated 3 years ago
Alternatives and similar repositories for LetsMapYourNetwork
Users that are interested in LetsMapYourNetwork are comparing it to the libraries listed below
Sorting:
- Visualize network topologies and collect graph statistics based on pcap files☆352Updated 2 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆673Updated last year
- a network packet capture compiler☆201Updated 3 years ago
- PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform☆637Updated 2 weeks ago
- DejaVU - Open Source Deception Framework☆414Updated last month
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆495Updated 9 months ago
- Cisco Config Analysis Tool☆456Updated 2 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆248Updated last month
- Code + documentation for the public GreyNoise API☆314Updated 4 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- Main MineMeld documentation repo☆378Updated 7 years ago
- AI-based, context-driven network device ranking☆300Updated last year
- Super Next generation Advanced Reactive honEypot☆467Updated last year
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆203Updated 2 years ago
- Open Source SIEM (Security Information and Event Management system).☆217Updated 2 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆86Updated 4 years ago
- Sguil client for NSM☆219Updated last year
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- A tool for analyzing firewall rules☆157Updated 7 years ago
- Snort + Barnyard2 + Pulledpork → The easy way!☆168Updated 4 years ago
- A platform built for easy-to-use automated network traffic analysis☆59Updated 2 years ago
- Passive Real-time Asset Detection System☆246Updated last year
- Open Source Threat Intelligence Chat Bot☆323Updated 5 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆651Updated last week
- Scirius is a web application for Suricata ruleset management and threat hunting.☆661Updated this week
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,024Updated 5 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Updated 2 years ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆485Updated 4 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 3 years ago