Loading...
Browse 1,311 network security tools
A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.
An open source DDoS protection system that uses distributed algorithms to defend against multi-vector attacks and scale to handle varying bandwidth requirements for network operators and service providers.
A simple honeypot that opens a listening socket and waits for connection attempts, with configurable reply and event handling
NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.
A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.
Stenographer is a high-performance full-packet-capture utility for intrusion detection and incident response purposes.
High-performance packet capture library with zero copy functionality.
Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.
A Python telnet honeypot that emulates shell environments to capture and analyze IoT malware and botnet binaries through automated detection mechanisms.
A low-interaction SSH honeypot written in C that simulates SSH services to capture and log unauthorized access attempts.
A featured networking utility for reading and writing data across network connections with advanced capabilities.
A declarative language for describing binary data structures that compiles into parsers for multiple programming languages.
A high-level C++ library for creating and decoding network packets with a Scapy-like interface.
A simple Telnet honeypot program that logs login attempts and credentials from botnet attacks, specifically designed to track Mirai botnet activity.
An API for constructing and injecting network packets with additional functionality.
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
A honeypot that simulates an exposed networked printer using PJL protocol to capture and log attacker interactions through a virtual filesystem.
A printer honeypot PoC that simulates a printer on a network to detect and analyze potential attackers.
Independent software vendor specializing in network security tools and network forensics.
AWS Shield provides managed DDoS protection for your applications, automatically detecting and mitigating sophisticated network-level DDoS events.
DOS attack by sending fake BPDUs to disrupt switches' STP engines.
Get strategic cybersecurity insights in your inbox