Comprehensive solutions for securing network infrastructure, traffic, and communications.Explore 248 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A multiplatform C++ library for capturing, parsing, and crafting network packets with support for various network protocols.
A multiplatform C++ library for capturing, parsing, and crafting network packets with support for various network protocols.
Nebula is a scalable overlay networking tool emphasizing performance, simplicity, and security.
Nebula is a scalable overlay networking tool emphasizing performance, simplicity, and security.
A tool for exploiting HTTP/2 cleartext smuggling vulnerabilities
A specialized packet sniffer for displaying and logging HTTP traffic, designed to capture, parse, and log traffic for later analysis.
A specialized packet sniffer for displaying and logging HTTP traffic, designed to capture, parse, and log traffic for later analysis.
A framework for creating and executing pynids-based decoders and detectors of APT tradecraft
A framework for creating and executing pynids-based decoders and detectors of APT tradecraft
Tool used to scan a range of IP addresses to identify active hosts and gather information about them.
Tool used to scan a range of IP addresses to identify active hosts and gather information about them.
A method for profiling SSL/TLS Clients with easy-to-produce client fingerprints.
A method for profiling SSL/TLS Clients with easy-to-produce client fingerprints.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
Network Dump data Displayer and Editor framework for tcpdump trace files manipulation.
Network Dump data Displayer and Editor framework for tcpdump trace files manipulation.
A simple IOC scanner bash script for Linux/Unix/OSX systems
A simple IOC scanner bash script for Linux/Unix/OSX systems
A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts
A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts
Linux packet crafting tool for testing IDS/IPS and creating attack signatures.
Linux packet crafting tool for testing IDS/IPS and creating attack signatures.
ICAP Server with Yara scanner for URL and content.
Open source framework for network traffic analysis with advanced features.
Open source framework for network traffic analysis with advanced features.
A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.
A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.
Identify unintended network access to AWS resources and ensure network security by analyzing network reachability conditions.
Identify unintended network access to AWS resources and ensure network security by analyzing network reachability conditions.
Detects and prevents SSRF attacks
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
Accurate detection of HTTPS interception and robust TLS fingerprinting tool.
Accurate detection of HTTPS interception and robust TLS fingerprinting tool.
A multi-threading tool for sniffing HTTP header records with support for offline and live sniffing, TCP flow statistics, and JSON output.
A multi-threading tool for sniffing HTTP header records with support for offline and live sniffing, TCP flow statistics, and JSON output.
A low-interaction honeypot for detecting and analyzing potential attacks on Android devices via ADB over TCP/IP
A low-interaction honeypot for detecting and analyzing potential attacks on Android devices via ADB over TCP/IP
Exploiting simple stack overflow vulnerabilities using return oriented programming (ROP) to defeat data execution prevention - DEP.
Exploiting simple stack overflow vulnerabilities using return oriented programming (ROP) to defeat data execution prevention - DEP.
A simple Docker-based honeypot to detect port scanning
Automated signature creation using honeypots for network intrusion detection systems.
Automated signature creation using honeypots for network intrusion detection systems.