Wireshark is a free, open-source network protocol analyzer that allows users to capture and display packet-level data, providing insights into network communication and troubleshooting capabilities. With Wireshark, users can analyze network protocols, troubleshoot network problems, and detect network intrusion attempts. The tool is widely used in many commercial and non-profit enterprises and is supported by the non-profit Wireshark Foundation. Wireshark offers various resources, including a university program, podcast, and conference, to help users learn and master the tool.
FEATURES
ALTERNATIVES
A free open-source security tool for macOS to detect unauthorized physical access.
Contains various use cases of Kubernetes Network Policies and sample YAML files.
A set of Bro/Zeek scripts that detect ATT&CK-based adversarial activity and raise notices
A tool for extracting common indicators of compromise from a block of text.
replayproxy allows you to 're-live' a HTTP session captured in a .pcap file, parsing HTTP streams, caching them, and starting a HTTP proxy to reply to requests with matching responses.
Object scanning system with scalable and flexible architecture for intrusion detection.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.