ntop is a network traffic probe that shows the network usage, similar to what the popular top Unix command does.
Read more
The Linux Portal Site
ntop is a network traffic probe that shows the network usage, similar to what the popular top Unix command does.
Read more
Simple Event Correlator (SEC) is an open source and platform independent event correlation tool. SEC is a simple event correlation tool.
Read more
Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols.
Read more
Knocker is a simple, and easy to use TCP security port scanner written in C. It’s able to analyze hosts and the network services which are running on them.
Read more
tcpreplay is a set of tools written which gives you the ability to use previously captured traffic in libpcap format to test a variety of network devices.
Read more
Darik’s Boot and Nuke (“DBAN”) is a self-contained boot disk that securely wipes the hard disks of most computers.
Read more
Nikto is a web server scanner which performs comprehensive tests against web servers for multiple items.
Read more
Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer).
Read more
P3Scan is a fully transparent proxy-server for POP3, SMTP, and limited POP3S Clients. It can be used to provide email scanning from the internet.
Read more
GRR Rapid Response is an incident response framework focused on remote live forensics.
Read more
MIG is a platform to perform investigative surgery on remote endpoints. It enables investigators to obtain information from large numbers of systems in parallel.
Read more
The Sleuth Kit (TSK) is a library and collection of command line file and volume system forensic analysis tools.
Read more
The Autopsy Forensic Browser is a graphical interface to the command line digital investigation tools in The Sleuth Kit.
Read more
The Volatility Framework is a completely open collection of tools, implemented in Python, for the extraction of digital artifacts from volatile memory (RAM) samples.
Read more
rdd is a forensic copy program developed at and used by the Netherlands Forensic Institute (NFI). rdd is a file and device copying utility.
Read more
The forensic imager contained in this package, guymager, was designed to support different image file formats, to be most user-friendly and to run fast.
Read moreSuricata is a threat detection engine, combining intrusion detection, intrusion prevention, network security monitoring and PCAP processing.
Read moreSnort is an open source network intrusion prevention and detection system utilizing a rule-driven language.
Read moreZeek (formerly known as Bro) is a powerful free and open source framework for network traffic analysis and security monitoring.
Read moreMaltrail is a malicious traffic detection system, utilizing publicly available (black)lists.
Read more