Displaying 1 to 17 from 17 results

maltrail - Malicious traffic detection system

  •    Python

Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. http://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware). Maltrail is based on the Traffic -> Sensor <-> Server <-> Client architecture. Sensor(s) is a standalone component running on the monitoring node (e.g. Linux platform connected passively to the SPAN/mirroring port or transparently inline on a Linux bridge) or at the standalone machine (e.g. Honeypot) where it "monitors" the passing Traffic for blacklisted items/trails (i.e. domain names, URLs and/or IPs). In case of a positive match, it sends the event details to the (central) Server where they are being stored inside the appropriate logging directory (i.e. LOG_DIR described in the Configuration section). If Sensor is being run on the same machine as Server (default configuration), logs are stored directly into the local logging directory. Otherwise, they are being sent via UDP messages to the remote server (i.e. LOG_SERVER described in the Configuration section).

NetworkEye - a iOS network debug library ,It can monitor HTTP requests within the App and displays information related to the request

  •    Objective-C

NetworkEye,a iOS network debug library,It can monitor HTTP requests within the App and displays information related to the request. It can be detected HTTP request include web pages, NSURLConnection, NSURLSession, AFNetworking, third-party libraries, third-party SDK ,and so on. very convenient and practical.

CocoaDebug - 🚀 iOS Debugging Tool

  •    Swift

Shake to hide or show the black bubble. (support both device and simulator). Long press the black bubble to show UIDebuggingInformationOverlay. (Apple's Private API, support iOS 10/11).




Dotzu - :iphone::eyes: In-App iOS Debugging Tool With Enhanced Logging, Networking Info, Crash reporting And More

  •    Swift

In-App iOS Debugging Tool With Enhanced Logging, Networking Info, Crash reporting And More. The debugger tool for iOS developer. Display logs, network request, device informations, crash logs while using the app. Easy accessible with its bubble head button 🔘. Easy to integrate in any apps, to handle development or testing apps easier. First version, there is plenty of room for improvement.

netgraph - A cross platform http sniffer with a web UI

  •    Go

Netgraph is a packet sniffer tool that captures all HTTP requests/responses, and display them in web page. You can run Netgraph in your linux server without desktop environment installed, and monitor http requests/responses in your laptop's browser.

prettyping - `prettyping` is a wrapper around the standard `ping` tool, making the output prettier, more colorful, more compact, and easier to read

  •    Shell

prettyping is a wrapper around the standard ping tool with the objective of making the output prettier, more colorful, more compact, and easier to read. prettyping runs the standard ping in the background and parses its output, showing the ping responses in a graphical way at the terminal (by using colors and Unicode characters).

lanGhost - 👻 A LAN dropbox chatbot controllable via Telegram

  •    Python

lanGhost is designed for Raspberry Pis (Raspbian/Kali for RPi). Running it on other/desktop distros could cause issues and may not work as excepted. You will need a Raspberry Pi with fresh Raspbian/Kali on the SD card, because you don't want anything else running in the background.


go-ping - A simple ping library using ICMP echo requests.

  •    Go

A simple ICMP Echo implementation, based on golang.org/x/net/icmp. Simply fork and create a pull-request. We'll try to respond in a timely fashion.

graphping - Ping a list of endpoints and write the results to statsd

  •    Go

You need to specify the address of the statsd listener you want to send metrics to. This is in string format, including port number.

docker-bro - Bro IDS Dockerfile

  •    Bro

This repository contains a Dockerfile of Bro-IDS blacktop/bro. Find a bug? Want more features? Find something missing in the documentation? Let me know! Please don't hesitate to file an issue and I'll get right on it.

docker-zeek - Zeek IDS Dockerfile

  •    Bro

Find a bug? Want more features? Find something missing in the documentation? Let me know! Please don't hesitate to file an issue and I'll get right on it. See all contributors on GitHub.

sniff-probes - Plug-and-play bash script for sniffing 802.11 probes requests :nose:

  •    Shell

Plug-and-play bash script for sniffing 802.11 probes requests. Probe requests are an 802.11 WIFI packet type that function to automatically connect network devices to the wireless access points (APs) that they have previously associated with. Whenever a phone, computer, or other networked device has Wi-Fi enabled, but is not connected to a network, it is constantly "probing"; openly broadcating the network names (SSIDs) of previously connected APs. Because wireless access points have unique and often personal network names, it is easy to identify the device owner by recognizing the names of networks they frequently connect to.

Sniffer - Networking activity logger for Swift

  •    Swift

To run the example project, clone the repo, and run pod install from the Example directory first. Sniffer is available under the MIT license. See the LICENSE file for more info.

histstat - history for netstat

  •    Python

This is a cross-platform command line tool for obtaining live, rudimentary network connection data on a computer system. This tool was designed for network and security analysts to easily view connections on a system as they occur. It will display useful information about network connections that utilities like netstat typically won't give you such as what time the connection was made, the exact command that created the connection, and the user that connection was made by. Note for Windows users: Detailed process information will not display unless you're running as NT AUTHORITY\SYSTEM. An easy way to drop into a system-level command prompt is to use PsExec from SysInternals. Run psexec -i -s cmd.exe as Administrator and then run histstat.