Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

Hping

Compare

  Analyzed almost 2 years ago

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.

18.4K lines of code

0 current contributors

about 14 years since last commit

5 users on Open Hub

Activity Not Available
3.0
   
I Use This

network grep

Compare

  Analyzed about 5 hours ago

ngrep strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. It currently recognizes IPv4/6, TCP, UDP, ICMPv4/6, IGMP ... [More] and Raw across Ethernet, PPP, SLIP, FDDI, Token Ring and null interfaces, and understands BPF filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop. [Less]

76.1K lines of code

0 current contributors

over 10 years since last commit

4 users on Open Hub

Inactive
3.33333
   
I Use This
Licenses: No declared licenses

Net::Pcap

Compare

  Analyzed about 9 hours ago

Perl binding to the LBL pcap(3) packet capture library. Also works on Windows systems using the WinPcap library.

6.09K lines of code

2 current contributors

5 months since last commit

2 users on Open Hub

Very Low Activity
4.0
   
I Use This
Licenses: Artistic-2.0, GPL-2.0+

Npcap

Compare

  Analyzed about 11 hours ago

Nmap Project's packet sniffing library for Windows, based on WinPcap/Libpcap improved with NDIS 6 and LWF.

42.9K lines of code

3 current contributors

8 days since last commit

1 users on Open Hub

Moderate Activity
0.0
 
I Use This
Licenses: No declared licenses

panoptes network monitor

Compare

  Analyzed 40 minutes ago

Panoptes is a host and network monitoring tool. It can scale to any size network in a single configuration. It also supports discovery of new devices on the network automatically.

16K lines of code

0 current contributors

over 6 years since last commit

1 users on Open Hub

Inactive
5.0
 
I Use This

dabba

Compare

  Analyzed about 5 hours ago

What is dabba? dabba is a set of network tools written for Linux. Its main use is to gather or scatter actions on a network such as traffic capture, replay, generation or monitoring on a network. This is inspired on the Dabba Walla system present in Mumbai where meals are regrouped and ... [More] dispatched throughout the city with a high efficiency rate, every day of the year. The project has 4 main components: - libdabba - low-level zero-copy network library - libdabba-rpc - protobuf-based rpc library for dabbad and dabba - dabbad - multi-threaded task manager and IPC query processor - dabba - CLI 'à la git' to communicate with dabbad and submit tasks [Less]

9.27K lines of code

0 current contributors

over 4 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This

Packet.Net

Compare

  Analyzed about 2 months ago

High performance .Net assembly for dissecting and constructing network packets such as ethernet, ip, tcp, udp etc.

28.5K lines of code

0 current contributors

almost 4 years since last commit

1 users on Open Hub

Activity Not Available
0.0
 
I Use This

winpcapy

Compare

  No analysis available

Python porting of winpcap - pcap exported functions using ctypes. No automatic install. Copy winpcapy.py into your site-packages dir. Some examples are in the examples directory. Get documentation about functions from official winpcap site Python version of winpcap sendpack example:from ctypes ... [More] import * from winpcapy import * fp=pcap_t errbuf= create_string_buffer(PCAP_ERRBUF_SIZE) packet=(c_ubyte * 100)() ## Check the validity of the command line if len(sys.argv) != 2: print ("usage: %s interface" % sys.argv[0]) sys.exit(1) ## Open the adapter fp = pcap_open_live(sys.argv[1],65536,PCAP_OPENFLAG_PROMISCUOUS ,1000,errbuf) if not bool(fp): print ("\nUnable to open the adapter. %s is not supported by WinPcap\n" % sys.argv[1]) sys.exit(2) ## Supposing to be on ethernet, set mac destination to 1:1:1:1:1:1 packet[0]=1 packet[1]=1 packet[2]=1 packet[3]=1 packet[4]=1 packet[5]=1 ## set mac source to 2:2:2:2:2:2 packet[6]=2 packet[7]=2 packet[8]=2 packet[9]=2 packet[10]=2 packet[11]=2 ## Fill the rest of the packet for i in range(12,100): packet[i]=i ## Send down the packet if (pcap_sendpacket(fp,packet,100) != 0): print ("\nError sending the packet: %s\n" % pcap_geterr(fp)) sys.exit(3) pcap_close(fp) sys.exit(0)Python version of winpcap basic dump example:from ctypes import * from winpcapy import * import time import sys import string import platform if platform.python_version()[0] == "3": raw_input=input #/* prototype of the packet handler */ #void packet_handler(u_char *param, const struct pcap_pkthdr *header, const u_char *pkt_data); PHAND=CFUNCTYPE(None,POINTER(c_ubyte),POINTER(pcap_pkthdr),POINTER(c_ubyte)) ## Callback function invoked by libpcap for every incoming packet def _packet_handler(param,header,pkt_data): ## convert the timestamp to readable format local_tv_sec = header.contents.ts.tv_sec ltime=time.localtime(local_tv_sec); timestr=time.strftime("%H:%M:%S", ltime) print print("%s,%.6d len:%d" % (timestr, header.contents.ts.tv_usec, header.contents.len)) packet_handler=PHAND(_packet_handler) alldevs=POINTER(pcap_if_t)() errbuf= create_string_buffer(PCAP_ERRBUF_SIZE) ## Retrieve the device list if (pcap_findalldevs(byref(alldevs), errbuf) == -1): print ("Error in pcap_findalldevs: %s\n" % errbuf.value) sys.exit(1) ## Print the list i=0 try: d=alldevs.contents except: print ("Error in pcap_findalldevs: %s" % errbuf.value) print ("Maybe you need admin privilege?\n") sys.exit(1) while d: i=i+1 print("%d. %s" % (i, d.name)) if (d.description): print (" (%s)\n" % (d.description)) else: print (" (No description available)\n") if d.next: d=d.next.contents else: d=False if (i==0): print ("\nNo interfaces found! Make sure WinPcap is installed.\n") sys.exit(-1) print ("Enter the interface number (1-%d):" % (i)) inum= raw_input('--> ') if inum in string.digits: inum=int(inum) else: inum=0 if ((inum < 1) | (inum > i)): print ("\nInterface number out of range.\n") ## Free the device list pcap_freealldevs(alldevs) sys.exit(-1) ## Jump to the selected adapter d=alldevs for i in range(0,inum-1): d=d.contents.next ## Open the device ## Open the adapter d=d.contents adhandle = pcap_open_live(d.name,65536,PCAP_OPENFLAG_PROMISCUOUS,1000,errbuf) if (adhandle == None): print("\nUnable to open the adapter. %s is not supported by Pcap-WinPcap\n" % d.contents.name) ## Free the device list pcap_freealldevs(alldevs) sys.exit(-1) print("\nlistening on %s...\n" % (d.description)) ## At this point, we don't need any more the device list. Free it pcap_freealldevs(alldevs) ## start the capture (we take only 15 packets) pcap_loop(adhandle, 15, packet_handler, None) pcap_close(adhandle) [Less]

0 lines of code

0 current contributors

0 since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: GPL-2.0+

etherpoke

Compare

  Analyzed about 8 hours ago

etherpoke is a scriptable network session monitor. etherpoke defines three events to which a hook (system command) can be assigned. The event hook can be any program installed in the system. SESSION_BEGIN is triggered when the first packet matching the filter rule is captured. SESSION_END ... [More] is triggered when the time since the last matching packet was captured exceeds the session timeout. SESSION_ERROR is triggered when it is no longer possible to proceed with packet capture, most likely due to network interface error. This event cancels out any future triggers of SESSION_END, until SESSION_BEGIN is triggered again. Since version 2.3.0, etherpoke has support for socket notifications (TCP protocol), allowing remote clients to be notified when any of the events is triggered. [Less]

1.04K lines of code

0 current contributors

almost 2 years since last commit

0 users on Open Hub

Very Low Activity
0.0
 
I Use This

DiNeMeter

Compare

  Analyzed about 1 hour ago

Multiple sub-projects with the combined purpose of metering traffic for shared internet connections.

5.27K lines of code

0 current contributors

over 6 years since last commit

0 users on Open Hub

Inactive
0.0
 
I Use This
Licenses: AGPL 3.0+, GPL-3.0+