caronte
Network analyzer
Analyze network flow during capture the flag events to detect patterns and connections
A tool to analyze the network flow during attack/defence Capture the Flag competitions
598 stars
8 watching
84 forks
Language: JavaScript
last commit: almost 3 years ago attack-defensecapture-the-flagctf-toolsnetwork-analysistcp-reassemblytraffic-analyzer
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Analyzes diffusion and contagion processes on networks using statistical analysis, visualization, and simulation. | 86 |
| | Analyzes and manipulates data from Zigbee and Thread networks to identify security vulnerabilities and simulate attacks. | 29 |
| | An analytical framework designed to identify malicious behavior in networks by analyzing network traffic and domain information. | 449 |
| | Analyzes network traffic data from captured packets to extract and decode specific protocols and information. | 183 |
| | A network attack tool designed to manage and analyze local networks | 1,449 |
| | A collection of scripts and tools for analyzing network traffic and security-related data | 1 |
| | Detects malicious servers in network traffic by analyzing encoded byte patterns | 20 |
| | A tool for analyzing and visualizing network traffic data using event clustering and parallel coordinates graphs. | 10 |
| | Provides tools for modeling and analyzing communication network data using statistical models. | 5 |
| | An open source package that enables easy analysis of network traffic data | 14 |
| | A collection of network analysis tools for R, providing various graph manipulation and analysis functions. | 15 |
| | A tool to visualize network traffic and extract information from packet captures | 1,700 |
| | Analyzes web-based network traffic to detect malicious command and control servers using Squid proxy server and Spamhaus | 78 |
| | Analyzes network traffic to investigate packet interactions and visualize connections on a graph-based platform. | 90 |
| | Analyzes network traffic to provide security assessments and recommendations for network platforms | 32 |