One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
FIRMAMENT runs, inside the Linux kernel, user supplied micro-programs over each processed message to emulate communication fault situations, using a script approach. The tool is appropriate to perform experiments over protocols and distributed systems.
A highly scalable network emulation tool which emulates dynamic, mobile ad-hoc wireless network topologies in real-time, featuring easy deployment and detailed network models. It was developed in the research project HIDENETS (http://www.hidenets.aau.dk)
Bannergrab is a next generation network service banner grabbing tool. In addition to simple banner grabbing it can send triggers to various services such as FTP, SMTP and HTTP to enumerate additional information, including support for SSL services.
Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
Program to test a libcap capture file for protocol coverage. Usable as a tester for packet generators meant to produce packet sets for testing of network interface projects.
dhcpmap offer ability to inject and capture DHCP traffic into your network. This can be valuable in testing protocol. dhcpmap is dependent on libnet 1.1.0+ and libpcap.
brutesshd is an application written in c/php in order to prevent bruteforce attacks through ssh. Brutesshd uses iptables/pfctl tools to block this type of attacks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Network Threat Simulation Tool (NTST) will be able to effectively simulate any network security threat including worms, Trojans, spywares, & exploits. It will help in testing the effectiveness of network security devices like IDS/IPS/Firewall.
Tomahawk is a command line utility that supports high speeds bidirectional replay (300-750 Mbps) of saved tcpdump(8) files. Tomahawk is great for testing the throughput and blocking capabilities of network-based intrusion prevention
systems (NIPS).
Documents for developers of Peer-to-Peer applications that need to be able to communicate across middleboxes such as firewalls and network address translators, and software tools for testing middleboxes for P2P friendliness.
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
NetChat is a network version of the "chat" utility that comes with PPP. It is a general purpose network "conversations" tool, designed for network testing. It can also be used for (very) quick setup of a server for a new protocol.
IP and Ethernet testing Tool ("IET") is an ethernet bridge addon for testing of network applications. It emulates network error conditions like packet loss, delay and bandwidth restraints. IET focuses on testing of network applications.
QT based Linux web security tool that it is designed to test targets for weak passwords using crack, leech and URL testing functions. Plugins allow potentially any protocol (eg http, ftp) or server to be attacked, while remaining anonymous using proxys.
A suite of tools (a sniffer, a TCP hijacker, an ARP poisoner and a TCP tunnel through ICMP/IGMP packets) created for testing TCP/IP weakness and using them in a non-conventional way. [Up to now I've done only the sniffer-related part]
Packit is a network auditing tool that allows you to monitor, manipulate, and inject customized IP traffic into your network. This can be valuable for testing firewalls, intrusion detection systems, port scanning, and general TCP/IP auditing.
mxtraf is a network traffic generator.
With mxtraf, a small number of hosts can be used to saturate a network with a tunable mix of TCP and UDP traffic. The primary purpose of mxtraf is to allow stress testing of experimental network protocols. m
RawICMP is an ICMP generator-analyser. It allows sending ICMP queries and ICMP errors through raw socket and to analyse replies. This tool could be useful for OS fingerprinting and for testing networks.
Blaster Scan is a TCP port scanner. It can extract users exploiting vrfy or expn, check anonymous access on FTP, check brute force on FTP and POP3, extract daemons\' versions, and scan for CGI bugs. It also has a SYN port scan, the ability to ping hosts t
IP packets generator, use row socket to generate various IP packets, including ICMP,TCP,UDP or user defined with fake source IP.
Use for network testing. (I write this program to test the router)