Netcap Logo

Netcap

0
Free
Visit Website

The Netcap (NETwork CAPture) framework efficiently converts a stream of network packets into platform neutral type-safe structured audit records that represent specific protocols or custom abstractions. These audit records can be stored on disk or exchanged over the network, and are well suited as a data source for machine learning algorithms. Since parsing of untrusted input can be dangerous and network data is potentially malicious, a programming language that provides a garbage collected memory safe runtime is used for the implementation. It was developed for a series of experiments in a bachelor thesis on the implementation and evaluation of secure and scalable anomaly-based network intrusion detection. Slides from the presentation at the Leibniz Supercomputing Centre of the Bavarian Academy of Sciences and Humanities are available on researchgate. The project won the 2nd Place at Kaspersky Labs SecurIT Cup 2018 in Budapest. Netcap uses Google's Protocol Buffers to encode its output, which allows accessing it across a wide range of programming languages. Alternatively, output can be emitted as comma separated values, which is a common input format for data analysis tools and systems.

FEATURES

ALTERNATIVES

A printer honeypot PoC that simulates a printer on a network to detect and analyze potential attackers.

A multi-threading tool for sniffing HTTP header records with support for offline and live sniffing, TCP flow statistics, and JSON output.

A Python-based web application scanner for OSINT and fuzzing OWASP vulnerabilities

AWS Shield provides managed DDoS protection for your applications, automatically detecting and mitigating sophisticated network-level DDoS events.

A wrapper around jNetPcap for packet capturing with Clojure, available for Linux and Windows.

Zeek Remote desktop fingerprinting script for fingerprinting Remote Desktop clients.

Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.

A powerful and extensible framework for reconnaissance and attacking various networks and devices.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved