Displaying 1 to 20 from 21 results

LibreNMS - Network monitoring system

  •    PHP

LibreNMS is an autodiscovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems including Cisco, Linux, FreeBSD, Juniper, Brocade, Foundry, HP and many more.

maltrail - Malicious traffic detection system

  •    Python

Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. http://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware). Maltrail is based on the Traffic -> Sensor <-> Server <-> Client architecture. Sensor(s) is a standalone component running on the monitoring node (e.g. Linux platform connected passively to the SPAN/mirroring port or transparently inline on a Linux bridge) or at the standalone machine (e.g. Honeypot) where it "monitors" the passing Traffic for blacklisted items/trails (i.e. domain names, URLs and/or IPs). In case of a positive match, it sends the event details to the (central) Server where they are being stored inside the appropriate logging directory (i.e. LOG_DIR described in the Configuration section). If Sensor is being run on the same machine as Server (default configuration), logs are stored directly into the local logging directory. Otherwise, they are being sent via UDP messages to the remote server (i.e. LOG_SERVER described in the Configuration section).

netgraph - A cross platform http sniffer with a web UI

  •    Go

Netgraph is a packet sniffer tool that captures all HTTP requests/responses, and display them in web page. You can run Netgraph in your linux server without desktop environment installed, and monitor http requests/responses in your laptop's browser.

Suricata IDS - Network threat detection engine

  •    C

The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing. Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats.




Naemon - Networks, Applications and Event Monitor, a Nagios fork

  •    C

Naemon is the new monitoring suite that aims to be fast, stable and innovative while giving you a clear view of the state of your network and applications. The Naemon core is a network monitoring tool based on the Nagios 4 core, but with many bug fixes, new features, and performance enhancements. If you today use Nagios, you should switch to Naemon to get bugfixes, new features, and performance enhancements.

Sguil - The Analyst Console for Network Security Monitoring

  •    Tcl

Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil's main component is an intuitive GUI that provides access to realtime events, session data, and raw packet captures. Sguil facilitates the practice of Network Security Monitoring and event driven analysis.

FreeMeter Revival

  •    CSharp

This is a new implementation of the FreeMeter application FreeMeter Revival is a simple, friendly network monitoring and diagnosis tool.

C# RRD Tools Monitoring GRAPH CHART

  •    CSharp

A pure RRD Tools c# impl all RRD tools functions http://oss.oetiker.ch/rrdtool/ pure c# implement,mean than can run without extenal RRD tools full compatible with jrobin http://jrobin.org


lanGhost - 👻 A LAN dropbox chatbot controllable via Telegram

  •    Python

lanGhost is designed for Raspberry Pis (Raspbian/Kali for RPi). Running it on other/desktop distros could cause issues and may not work as excepted. You will need a Raspberry Pi with fresh Raspbian/Kali on the SD card, because you don't want anything else running in the background.

marmot - Marmot workflow execution engine

  •    Go

Marmot is a service for processing workflows targeting DevOps/SRE needs.NOTICE This product is still in development and is not production ready.

nsot - Network Source of Truth is an open source IPAM and network inventory database

  •    Python

Network Source of Truth (NSoT) is a source of truth database and repository for tracking inventory and metadata of network entities to ease management and automation of network infrastructure.NSoT is an API-first application that provides a REST API and a web application front-end for managing IP addresses (IPAM), network devices, and network interfaces.

nodewatcher - A modular open networks growing platform.

  •    Python

nodewatcher is one of the projects of wlan slovenija open wireless network. Its main goal is the development of an open source network planning, deployment, monitoring and maintanance platform with emphasis on community. This is the development branch with future (3.0) version of nodewatcher which is still being developed and does not have all the functionality found in the 2.0 version. For stable 2.0 version, switch to the master branch.

go-ping - A simple ping library using ICMP echo requests.

  •    Go

A simple ICMP Echo implementation, based on golang.org/x/net/icmp. Simply fork and create a pull-request. We'll try to respond in a timely fashion.

graphping - Ping a list of endpoints and write the results to statsd

  •    Go

You need to specify the address of the statsd listener you want to send metrics to. This is in string format, including port number.

passer - Passive service locator, a python sniffer that identifies servers, clients, names and much more

  •    Python

Quick notes for getting going with passer, the passive service sniffer. You're responsible for getting permission to sniff. If you're using windows or your paths to the support files don't match mine for some other reason, let me know where they are and I'll be glad to update the script.

conntrack-logger - Tool to log conntrack flows and associated process/service info

  •    Python

Tool to make best effort to log conntrack flows along with associated pids, which service cgroup they belong to and misc other info about them. Think of it as an auditd extension to log network connections.

histstat - history for netstat

  •    Python

This is a cross-platform command line tool for obtaining live, rudimentary network connection data on a computer system. This tool was designed for network and security analysts to easily view connections on a system as they occur. It will display useful information about network connections that utilities like netstat typically won't give you such as what time the connection was made, the exact command that created the connection, and the user that connection was made by. Note for Windows users: Detailed process information will not display unless you're running as NT AUTHORITY\SYSTEM. An easy way to drop into a system-level command prompt is to use PsExec from SysInternals. Run psexec -i -s cmd.exe as Administrator and then run histstat.