Sort by new | name

Armory

Showing 1 - 15 of 92

Bit-Twist

With Bit-Twist, you can now regenerate your captured traffic onto a live network! Packets are generated from tcpdump trace file (.pcap file). Bit-Twist also comes with a comprehensive trace file editor to allow you to change the contents of a trace file. Generally, packet generator is useful in simulating networking ...

Packet Analysis Packet Crafting


Network Weathermap

Provide manager (and NOC display) friendly overviews of existing monitoring data in graphical form. Well integrated with Cacti, but works standalone with data from RRDtool, text files or other sources.

Network Monitoring


Whoisup

WhoisUP monitors hosts via ICMP and shows the status in a web page. When a host is down, the script can send mail, syslog message, open a popup message or play a sound. The script uses NMap to send ICMP packets and to save the host status into an XML ...

Network Monitoring Network Utilities System Monitoring


libtins

libtins is a C++ library for crafting, sending, sniffing and interpreting raw network packets. Its main purpose is to provide the C++ developer an easy, efficient, platform and endianess-independent way to create tools which need to send, receive and manipulate specially crafted packets.

Packet Crafting


Netdisco

Netdisco is an Open Source web-based network management tool first released publically in 2003. The target users are large corporate and university networks administrators. Data is collected into a Postgres database using SNMP and presented with a clean web interface using Mason. Configuration information and connection data for network devices ...

Enumeration Network Monitoring


Ostinato

Ostinato is an open-source network packet and traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and become complementary to Wireshark. It features custom packet crafting with editing of any field for several protocols: Ethernet, 802.3, LLC SNAP, VLAN (with Q-in-Q), ARP, IPv4, IPv6, ...

Packet Crafting


Observium

Observium is an auto-discovering PHP/MySQL based network monitoring system focused primarily on Cisco and Linux networks but includes support for a wide range of network hardware and operating systems. Observium has grown out of a lack of easy to use NMSes. It is intended to provide a more navigable interface ...

Network Monitoring


AsItHappens Network Statistic Collector

AsItHappens is a real-time network statistic collector and grapher. It collects data from devices over a network and displays them on a graph, optionally storing collected data in a database for later retrieval. Current collection types include network response, bandwidth, processor usage, memory usage, Cisco NBAR, Cisco NetFlow and arbitrary ...

Network Monitoring


Wireshark

Wireshark is the world's foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries and educational institutions.

Network Utilities Packet Analysis


netcat

Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging ...

Network Utilities


Nessus

The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks. When Nessus is managed with Tenable's ...

Enumeration Vulnerability Scanning


Snort

Snort is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de ...

Intrusion Detection Packet Analysis


Metasploit Framework

The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language ...

Exploitation Vulnerability Scanning


hping

hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping(8) unix command, but hping isn't only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many ...

Network Utilities Packet Analysis Packet Crafting


Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, ...

Packet Analysis Wireless


Showing 1 - 15 of 92