NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic.
New versions of NetworkMiner are released exclusively on www.netresec.com since version 2.0 of NetworkMiner. This page on SourceForge is only kept to provide hosting of older versions of the software.
To get the latest version of...
An open-source corpus analysis class library written in C#. GUI of Tenka Text 0.1.3 comes with Wordlister - an advanced, extremely fast graphical wordlist tool and a simple regex concordance tool. Tenka Text - the open-source answer to WordSmith Tool
The Coding Analysis Toolkit (or "CAT") consists of a ASP.NET based suite of tools to facilitate efficient and effective analysis of text datasets that have been coded using the CAT coding module or ATLAS.ti.
A computerised clinical decision support advancement for emergency med
ACAFE-a computerised clinical decision support advancement for emergency medicine. Hospital electronic medical record EHR or EMR. Used commercially. Other uses include research-development into chronic and infectious-diseases.
Watch video here of demo https://www.youtube.com/watch?v=SGlicILHhJs
A toolkit for crawling information from web pages by combining different kinds of "actions". Actions are simple operations such as navigation to a specified url or extraction of text from the html. Also available is a graphic user interface.
Met Sportlog kun je je sportieve prestaties bijhouden via een Plone-webapplicatie. Uniek is dat er verschillende rollen zijn gedefinieerd met verschillende rechten: sporter, trainer, medicus etc. en dat de omgeving zeer flexibel is.
VisualPetri is Petri net editor for Windows platform based on GDI Plus library with an integrated simulator. Note: a Petri net is one of several mathematical representations of discrete distributed systems.
Fingerprint Copy is a forensic copy utility. The utility creates copy of file(s) and verifies this copies with digital fingerprints(checksum) of the source file(s). The utility is in a early development state. Planed: March 2009 First Command-line Utiliy
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.