245 tools and resources
Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Boost Your VisibilityA daemon for blocking USB keystroke injection devices on Linux systems
Snort 3 is the next generation Snort IPS with enhanced features and improved cross-platform support.
TCPFLOW is a tool for capturing data transmitted over TCP connections.
A KDE Plasma 4 widget that displays real-time traffic information for active network connections on Linux computers.
FingerprintX is a standalone utility for service discovery on open ports.
Set up your own IPsec VPN server in just a few minutes with IPsec/L2TP, Cisco IPsec, and IKEv2.
A tool for extracting common indicators of compromise from a block of text.
A textmode sniffer for tracking tcp streams and capturing data in various modes.
High-speed packet capture library with user-level network socket.
Network Forensic Analysis Tool for deep network traffic inspection and analysis.
A tool that reads IP packets from the network or a tcpdump save file and writes an ASCII summary of the packet data.
Zeek Remote desktop fingerprinting script for fingerprinting Remote Desktop clients.
A multi-threaded intrusion detection system using Yara for network and stream IDS
A multiplatform C++ library for capturing, parsing, and crafting network packets with support for various network protocols.
Nebula is a scalable overlay networking tool emphasizing performance, simplicity, and security.
A tool for exploiting HTTP/2 cleartext smuggling vulnerabilities
A specialized packet sniffer for displaying and logging HTTP traffic, designed to capture, parse, and log traffic for later analysis.
A framework for creating and executing pynids-based decoders and detectors of APT tradecraft
Tool used to scan a range of IP addresses to identify active hosts and gather information about them.
A method for profiling SSL/TLS Clients with easy-to-produce client fingerprints.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.