GRASSMARLIN provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security. Passively map, and visually display, an ICS/SCADA network topology while safely conducting device discovery, accounting, and reporting on these critical cyber-physical systems. Documentation: GrassMarlin v3.2 User Guide: Download PDF View PDF on GitHub A presentation on GRASSMARLIN is also available. Release: Download the latest release. File hashes are located in FileHash.md. License: See LICENSE.md. Disclaimer: See DISCLAIMER.md.
FEATURES
SIMILAR TOOLS
A command line tool for running SQL queries on PCAP files with various output options and a simplistic web-server.
LogRhythm NetMon is a network traffic analytics tool that provides real-time visibility, automated threat detection, and investigation capabilities for organizational networks.
A fast and flexible HTTP enumerator for content discovery and credential bruteforcing
An API for constructing and injecting network packets with additional functionality.
Akamai Guardicore Segmentation is a microsegmentation tool that provides network visibility, policy creation, and enforcement to prevent lateral movement and protect critical assets in diverse IT environments.
Django based web application for network traffic analysis with protocol handling capabilities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.