The program xplot was written in the late 1980s to support the analysis of TCP packet traces. Downloads of the program xplot are available on the xplot.org website. The most recent complete release is xplot-0.90.tar.gz, but for better color support on modern hardware, consider using the interim release xplot-0.90.7.tar.gz. If you need demo files, download version 0.90.tar.gz. A patch to version 0.90.7 creates version 0.90.7.1, which can be compiled with gcc-3.3. For beginners, it is recommended to use xplot-0.90.7.1.tar.gz and obtain the demo files from the larger 0.90.tar.gz file.
Common questions about Xplot including features, pricing, alternatives, and user reviews.
Xplot is A tool for analyzing TCP packet traces with color support. It is a Security Operations solution designed to help security teams with TCP, Security Tools.
Xplot is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://www.xplot.org/ for download and installation instructions.
Popular alternatives to Xplot include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Xplot is for security teams and organizations that need TCP, Security Tools. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Binwalk is a firmware analysis tool that enables reverse engineering and extraction of embedded file systems and archives from firmware images.
A Yara ruleset designed to detect PHP shells and other webserver malware for malware analysis and threat detection.
An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.
A GNU Emacs editor mode that provides syntax highlighting, indentation, and language server integration for editing YARA rule files.
FIR is a Python-based cybersecurity incident management platform designed for CSIRTs, CERTs, and SOCs to create, track, and report security incidents.