Showing 11 open source projects for "network discovery tool"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    BigBountyRecon

    BigBountyRecon

    Automates reconnaissance for bug bounty and penetration testing target

    ...Its main goal is to accelerate the information-gathering phase, which is often considered one of the most important steps in penetration testing and bug hunting. By quickly identifying potential information leaks and publicly exposed resources, the tool helps users gain an initial understanding of the target’s security posture. BigBountyRecon allows researchers to perform multiple reconnaissance checks without having to manually remember or craft complex search queries. It aggregates results from dozens of discovery techniques so analysts can identify possible entry points and weak configurations.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 2

    ovpnSrvMon

    OpenVPN server/client monitoring tool

    This is OpenVPN server and client monitoring tool. Software was designed for OpenVPN configured with SSL certificates. It uses management interface to monitor OpenVPN instance. Using it You can manage logged in certificates and server logs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    LOIC-0

    LOIC-0

    A NETWORK STRESS TOOL BASED ON PRAETOX LOIC

    ...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES THIS TOOL IS RELEASED WITH NO WARRANTY AT ALL. TAGS: LOIC,Low Orbit Ion Cannon, network, stress test, security software, network tool, Windows,Linux, LOWC, Low Orbit Web Cannon, network, stress testing, load testing, server load testing, server testing.
    Leader badge
    Downloads: 47 This Week
    Last Update:
    See Project
  • 4

    AlertWheel

    AlertWheel is a visualization-based analysis tool for Snort IDS logs

    AlertWheel is a new software application easing network analysis on large-scale networks. It is based on a novel radial visualization capable of simultaneously displaying several thousand alerts, emphasizing the most important alerts or patterns in the dataset. Among other things, AlertWheel offers a new technique for representing bipartite graphs (where links exist between two distinct node groups). Using this approach, links are positioned in a way to reduce occlusion in the visualization....
    Downloads: 0 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 5
    Network Signature Manager (N.S.M) Lite

    Network Signature Manager (N.S.M) Lite

    Manage your Snort rules with N.S.M.

    N.S.M Lite is a simple and easy way to manage your signatures for your Snort based IDS/IPS implementation, which can improve IDS/IPS signature development for accurate detection of malicious malware. Additionally, N.S.M can be used a learning tool to help you understand the complex nature of Intrusion Detection and/or Prevention (IDP) signatures for the Snort platform.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    NetworkMiner packet analyzer

    NetworkMiner packet analyzer

    The Network Forensics Tool

    NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows that can detect the OS, hostname and open ports of network hosts through packet sniffing or by parsing a PCAP file. NetworkMiner can also extract transmitted files from network traffic. New versions of NetworkMiner are released exclusively on www.netresec.com since version 2.0 of NetworkMiner.
    Leader badge
    Downloads: 59 This Week
    Last Update:
    See Project
  • 7
    Bandwidth measuring tool that works by pinging remote hosts much like plain old ping command.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    We! Analyze By Or Cohen

    We! Analyze By Or Cohen

    We! Analyze - designed to analyze ArcSight SmartConnectors logs.

    One of the biggest issues we have as ArcSight administrators is knowing what's going on with our connectors. A connector may be "up and running" but actually it has not sent a single event in weeks. Also, many single connectors collect events from multiple locations (multi database, multi file, WUC) and we might never know one of these locations is unavailable as events from the other locations are arriving so the connector seems to be working fine. Eventually, when we do understand that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Gui for aircrack-ng that can crack WEP and WPA networks, automatically scans for available networks, provides fake authentication and injection support.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Binary Cyber Cannon is an open source network attack tool for Windows written in C++ with the interface written in C#.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    ITkeys automates the security management process for Windows networks (Active Directory groups). Delegates the ability to amend relevant IT access for employees to their managers. Wizzard based web tool requiring no formal training. No more ADUC MMC!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB