Network Monitoring

Explore 25 curated cybersecurity tools, with 17,376+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Endian UTM Logo

UTM security gateway for IT networks with threat management and connectivity

0
Red Hand Analyzer Logo

Red Hand Analyzer is an online tool that provides automated behavioral analysis of PCAP files to detect malicious network activities and security vulnerabilities without decrypting traffic content.

1
Safing Portmaster Logo

An open-source application firewall that monitors and controls network traffic with custom filtering rules and real-time visibility into application connections.

2
LogRythm NetMon Logo

LogRhythm NetMon is a network traffic analytics tool that provides real-time visibility, automated threat detection, and investigation capabilities for organizational networks.

0
GQUIC Protocol Analyzer Logo

A Zeek-based protocol analyzer that parses GQUIC traffic to extract connection metadata and create fingerprints for detecting anomalous network behavior.

0
Apache Spot (Incubating) Logo

Apache Spot is an open source big data platform that analyzes network flows and packet data to identify security threats and provide visibility into enterprise computing environments.

0
Zeek Analysis Tools (ZAT) Logo

ZAT is a Python package that processes and analyzes Zeek network security data using machine learning libraries like Pandas, scikit-learn, Kafka, and Spark.

0
Sniff Logo

Makes output from the tcpdump program easier to read and parse.

0
Troje Logo

Troje is a honeypot that creates dynamic LXC container environments to attract and monitor attackers while recording their activities and system changes.

0
Respounder Logo

A cross-platform network detection tool that identifies active Responder tools by sending LLMNR queries for fabricated hostnames.

0
Bro IDS Logo

An open-source network security monitoring tool.

0
HoneyDrive Logo

HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.

0
DET (extensible) Data Exfiltration Toolkit Logo

DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.

0
BPF+: Exploiting Global Data-flow Optimization in a Generalized Packet Filter Architecture Logo

BPF+ is a generalized packet filter framework that achieves both high-level expressiveness and good performance for network monitoring and intrusion detection applications.

0
Ipsumdump Logo

A tool that reads IP packets from the network or a tcpdump save file and writes an ASCII summary of the packet data.

0
httpry Logo

A specialized packet sniffer for displaying and logging HTTP traffic, designed to capture, parse, and log traffic for later analysis.

0
BW-Pot Logo

BW-Pot is an interactive web application honeypot that deploys vulnerable applications to attract and monitor HTTP/HTTPS attacks, with automated logging to Google BigQuery for analysis.

0
PacketQ Logo

A command-line tool that allows SQL queries to be executed directly on PCAP files for network traffic analysis with support for multiple output formats.

0
Hale Logo

Hale is a modular botnet command and control monitoring tool that tracks C&C server communications across multiple protocols with web-based analysis interface and collaborative research capabilities.

0
Shodan Logo

A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.

1
DroidBox Logo

DroidBox is a dynamic analysis framework for Android applications that monitors runtime behavior, network activity, file operations, and security events while generating behavioral visualizations.

0
Gatekeeper Logo

An open source DDoS protection system that uses distributed algorithms to defend against multi-vector attacks and scale to handle varying bandwidth requirements for network operators and service providers.

0
PF_RING ZC (Zero Copy) Logo

High-performance packet capture library with zero copy functionality.

0
Netis Cloud Probe Logo

An open source packet capture and forwarding tool that captures network packets on one machine and sends them to another for remote monitoring and analysis.

0