Modern VPN protocol emphasizing simplicity and performance.
Browse & filter
Filter by platform, license text, maturity, maintenance cadence, and editorial tags like privacy-focused or self-hosted. Search matches names, summaries, tags, and use cases.
12 tools match your filters
Network protocol analyzer for deep packet inspection and forensic debugging.
Open network access control (NAC): captive portal, 802.1X, guest access, and device profiling for wired and wireless networks.
Network attack framework: Wi-Fi, BLE, LAN recon, ARP/DNS spoofing, proxy, and modular caplets.
High-performance IDS/IPS and network security monitoring with multi-threading, TLS inspection options, and Lua scripting.
Classic packet-sniffing IDS/IPS with rule language and community rule feeds; Snort 3 improves scaling.
Network security monitor producing rich logs (conn, DNS, HTTP, SSL, files) for analytics—not a classic IDS signature engine.
Large-scale full packet capture, indexing, and search (SPIE) with a web UI—successor to the Moloch lineage for NSM teams.
Real Intelligence Threat Analytics: ingest Zeek logs to score beaconing, long connections, blacklisted DNS, and lateral patterns.
Thinkst low-interaction honeypot daemon emulating services (SSH, HTTP, SMB, etc.) to generate tamper-evident intrusion signals.
Fast port scanner designed for scripting and CI.
Network discovery and security auditing scanner with scripting (NSE) and OS fingerprinting.
