Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

Snort

Compare

  Analyzed about 2 months ago

Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth ... [More] port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rule based language to describe traffic that it should collect or pass, and a modular detection engine. Snort has a real-time alerting capability, with alert mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages to Windows clients using Samba's smbclient. [Less]

303K lines of code

18 current contributors

3 months since last commit

86 users on Open Hub

Activity Not Available
4.09091
   
I Use This

Suricata IDS/IPS

Compare

  Analyzed 2 months ago

Suricata is an open source Intrusion Detection and Prevention (IDS/IPS) engine. Suricata is developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded, has native IPv6 support, file extraction capabilities and many more features. It's capable of ... [More] loading existing Snort rules and signatures and supports many frontends through Barnyard2. [Less]

358K lines of code

32 current contributors

3 months since last commit

15 users on Open Hub

Activity Not Available
4.57143
   
I Use This

Homer SIP Capture

Compare

  Analyzed about 2 months ago

HOMER is a robust, carrier-grade, scalable SIP Capture system and Monitoring Application with HEP/HEP2, IP Proto4 (IPIP) encapsulation & port mirroring/monitoring support right out of the box, ready to process & store insane amounts of signaling with instant search, end-to-end analysis and ... [More] drill-down capabilities for ITSPs, VoIP Providers and Trunk Suppliers using SIP signaling [Less]

44.2K lines of code

28 current contributors

3 months since last commit

10 users on Open Hub

Activity Not Available
5.0
 
I Use This

sipp

Compare

  Analyzed about 2 months ago

Sipp is a performance testing tool for the SIP protocol. It includes a few basic SipStone user agent scenarios (UAC & UAS) and establishes and releases multiple calls with the INVITE and BYE methods. It also reads XML scenario files describing any performance testing configuration. It features ... [More] the dynamic display of statistics about running tests, periodic CSV statistics dumps, TCP, UDP, or TLS over IPv4 or IPv6 over multiple sockets or multiplexed with retransmission management, regular expressions and variables in scenario files, conditional branching, and dynamically-adjustable call rates. Since 1.1rc4, RTP play (voice and RFC2833 DTMFs) is also supported. [Less]

48.4K lines of code

9 current contributors

3 months since last commit

9 users on Open Hub

Activity Not Available
5.0
 
I Use This

The ns-3 network simulator

Compare

  Analyzed 7 months ago

ns-3 is a discrete-event network simulator for Internet systems, targeted primarily for research and educational use. ns-3 is free software, licensed under the GNU GPLv2 license, and is publicly available for research, development, and use. ns-3 is intended as an eventual replacement for the ... [More] popular ns-2 simulator. The project acronym “nsnam” derives historically from the concatenation of ns (network simulator) and nam (network animator). [Less]

1.25M lines of code

35 current contributors

10 months since last commit

7 users on Open Hub

Activity Not Available
5.0
 
I Use This

netsniff-ng

Compare

  Analyzed 2 months ago

netsniff-ng is is a free, performant Linux network analyzer and networking toolkit. The gain of performance is reached by zero-copy mechanisms, so that the kernel does not need to copy packets from kernelspace to userspace and vice versa. netsniff-ng consists of much more than only a network ... [More] analyzer. Next to the zero-copy sniffer itself, further tools like trafgen, a powerful zero-copy network packet generator, or ifpps, a tool that provides top-like kernel networking statistics, and curvetun, a lightweight curve25519-based multiuser IP tunnel, are being shipped. [Less]

68.6K lines of code

8 current contributors

3 months since last commit

6 users on Open Hub

Activity Not Available
5.0
 
I Use This

Hping

Compare

  Analyzed 10 months ago

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.

18.4K lines of code

0 current contributors

about 13 years since last commit

5 users on Open Hub

Activity Not Available
3.0
   
I Use This

network grep

Compare

  Analyzed about 2 months ago

ngrep strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. It currently recognizes IPv4/6, TCP, UDP, ICMPv4/6, IGMP ... [More] and Raw across Ethernet, PPP, SLIP, FDDI, Token Ring and null interfaces, and understands BPF filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop. [Less]

76.1K lines of code

0 current contributors

over 9 years since last commit

4 users on Open Hub

Activity Not Available
3.33333
   
I Use This
Licenses: No declared licenses

WireSPY

Compare

  Analyzed almost 5 years ago

Network Packet Sniffer based on pcap library

405 lines of code

0 current contributors

over 6 years since last commit

3 users on Open Hub

Activity Not Available
5.0
 
I Use This

prads

Compare

  Analyzed about 2 months ago

Prads is a `Passive Real-time Asset Detection System`. It passively listen to network traffic and gathers information on hosts and services it sees on the network. This information can be used to map your network, letting you know what services and hosts are alive/used, or can be used together with ... [More] your favorite IDS/IPS setup for "event to host/service" correlation. [Less]

12.6K lines of code

0 current contributors

over 1 year since last commit

3 users on Open Hub

Activity Not Available
0.0
 
I Use This