Skip to content
OpenCatalogcurated by FLOSSK

Browse & filter

Filter by platform, license text, maturity, maintenance cadence, and editorial tags like privacy-focused or self-hosted. Search matches names, summaries, tags, and use cases.

12 tools match your filters

Network protocol analyzer for deep packet inspection and forensic debugging.

networkanalysisforensicsdebugging

Open network access control (NAC): captive portal, 802.1X, guest access, and device profiling for wired and wireless networks.

nac802.1xradiuscaptive-portalnetwork

Network attack framework: Wi-Fi, BLE, LAN recon, ARP/DNS spoofing, proxy, and modular caplets.

pentestmitmwifinetwork

High-performance IDS/IPS and network security monitoring with multi-threading, TLS inspection options, and Lua scripting.

idsipsnetworksocdetection

Classic packet-sniffing IDS/IPS with rule language and community rule feeds; Snort 3 improves scaling.

idsipsnetworksoc

Network security monitor producing rich logs (conn, DNS, HTTP, SSL, files) for analytics—not a classic IDS signature engine.

nsmnetworksocthreat-huntinglogs

Large-scale full packet capture, indexing, and search (SPIE) with a web UI—successor to the Moloch lineage for NSM teams.

nsmpcapsocthreat-huntingnetwork

Real Intelligence Threat Analytics: ingest Zeek logs to score beaconing, long connections, blacklisted DNS, and lateral patterns.

threat-huntingzeekbeaconingnetworkanalytics

Thinkst low-interaction honeypot daemon emulating services (SSH, HTTP, SMB, etc.) to generate tamper-evident intrusion signals.

honeypotdeceptiondetectionnetworksensor

Network discovery and security auditing scanner with scripting (NSE) and OS fingerprinting.

scannernetworksecurity