BruteShark is a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic, including password extracting, network mapping, TCP session reconstruction, encrypted password hash extraction, and conversion to Hashcat format for offline Brute Force attacks. It aims to assist security researchers and network administrators in identifying network weaknesses. It offers both a GUI-based application for Windows and a Command Line Interface tool for Windows and Linux, with independent project modules for network traffic analysis on Linux or Windows machines.
FEATURES
SIMILAR TOOLS
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.
NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.
A free DNS recursive service that blocks malicious host names and protects user privacy.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
A website scanner that provides a sandbox for the web, allowing users to scan URLs and websites for potential threats and vulnerabilities.
NBD (Network Block Device) is a network protocol implementation that allows clients to access remote block devices over a network as if they were local storage.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.