Libnids is an implementation of an E-component of Network Intrusion Detection System. It emulates the IP stack of Linux 2.0.x. Libnids offers IP defragmentation, TCP stream assembly and TCP port scan detection. The most valuable feature of libnids is reliability. A number of tests were conducted, which proved that libnids predicts behaviour of protected Linux hosts as closely as possible. Libnids is highly configurable in run-time and offers a convenient interface. Currently it compiles on Linux, *BSD and Solaris. WIN32 port is maintained separately here. Using libnids, one has got a convinient access to data carried by a TCP stream, no matter how artfully obscured by an attacker. You may have a look at a sample application. Libnids is designed by Rafal Wojtczuk. Numerous people have contributed - see the README file in the source directory. For more information on libnids contact Rafal Wojtczuk. It emulates the IP stack of Linux 2.0.x. Currently it compiles on Linux, *BSD and Solaris. Using libnids, one has got a convinient access to data carried by a TCP stream, no matter how artfully obscured by an attacker. Libnids is designed by Rafal Wojtczuk. Numerous people have contributed - see the README file in the source directory. For more information on libnids contact Rafal Wojtczuk.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Fake Protocol Server tool with support for multiple network services and protocols.
A honeypot system designed to detect and analyze potential security threats
An extended traceroute tool for CSIRT operators with advanced features.
A set of Go-based emulators for testing network security and analyzing network traffic.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
A Burp Suite extension that formats GraphQL requests for easier reading
A cross-platform network detection tool that identifies Responder presence by sending LLMNR queries for non-existent hostnames.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.