passive device fingerprinting api for network intrustion detection
-
Updated
May 4, 2018 - Python
passive device fingerprinting api for network intrustion detection
Usable web interface to perform offline network analysis
CyberScan: Network's Forensics ToolKit
network security monitoring visibility , ELK, CTI, DFIR
Overview of some network tools that can be used during the network forensics (extended with some publicly available datasets)
Contains beginner-level network forensics challenges from various CTFs.
tshark network forensics ubuntu windows
Designing and implementing a Packet-Based Intelligent Network phishing Intrusion Detection system. The idea of the design is to use machine learning to classify Network packets to benign and phishing in real-time flow (for both http/https protocol) based on DNS records and domain name features. It operates by using a pre-programmed list of known…
Hands-On Network Forensics by Nipun Jaswal
Program for static analysis of pcap files and recreation of information sent
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University
🛰️ A sophisticated network mapper and analyser
NETWORK FORENSICS: 25 different honeypots in a single pypi package! (dns, ftp, httpproxy, http, https, imap, mysql, pop3, postgres, redis, smb, smtp, socks5, ssh, telnet, vnc, mssql, elastic, ldap, ntp, memcache, snmp, oracle, sip and irc)
IoT Forensics Master Thesis @POLIMI
The Network Traffic Analyzer is a Python script designed for capturing and analyzing network traffic, focusing primarily on DNS traffic. This tool provides users with the capability to monitor network activity in real-time and extract relevant information from captured packets.
Filter background traffic from capture files
Write-ups for CTF-like, CyberSec training platforms (BTLO, CyberDefenders, Hack The Box Sherlocks)
Add a description, image, and links to the network-forensics topic page so that developers can more easily learn about it.
To associate your repository with the network-forensics topic, visit your repo's landing page and select "manage topics."