Zeek has a long history in the open source and digital security worlds. Vern Paxson began developing the project in the 1990s under the name “Bro” as a means to understand what was happening on his university and national laboratory networks. Vern and the project’s leadership team renamed Bro to Zeek in late 2018 to celebrate its expansion and continued development. Zeek is not an active security device, like a firewall or intrusion prevention system. Rather, Zeek sits on a “sensor,” a...
The BRST - Border Router Security Tool is a web based utility for generating secure configuration files for Cisco routers in a border configuration. The administrator fills out a web form, clicks submit, and receives a router config file.
HAPviewer is a host application profile graphlet viewer. It visualizes network data through graphs on a per-host level such that running applications are apparent. Groups of flows are summarized to aggregates of per-role traffic.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
The IPv6 Stack that runs on your target. FIP is designed to fit in medium-sized 8-bit microcontrollers, while not sacrificing performance on larger devices.
Logpp is a tool for preprocessing event logs and feeding relevant data to other programs for storing or in-depth analysis. Logpp reads lines appended to input files, matches the lines with patterns, and writes the results to given destinations.
NS-2 Trace Statistics is a tool for easy generation of summary statistics from Network Simulator trace files, such as: total and network delay, packets generated, sent, received and dropped, run length histograms and MRU stack depth.
Hank is a scalable, extensible, modular, threaded user-space program to handle all your packet juggling needs. It'll analyze, report, and act on network traffic in any protocol, at any OSI layer, at any nesting depth. And it'll do it damned fast.