Aircrack-ng is a complete suite of tools to assess WiFi network security.
It focuses on different areas of WiFi security:
Monitoring: Packet capture and export of data to text files for further processing by third party tools
Attacking: Replay attacks, deauthentication, fake access points and others via packet injection
Testing: Checking WiFi cards and driver capabilities (capture and injection)
Cracking: WEP and WPA PSK (WPA 1 and 2)
All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2.
Maresware was originally designed to assist law enforcement personnel in the analysis and processing of computer related evidence, and for the raw processing of multi megabytes of data by both computer forensic examiners and auditors. Maresware was designed to handle extremely large amounts of data and to do so at maximum speed. Therefore, it was written in pure "C", which outperforms most other languages. Today, it can process those large amounts of giga and tera bytes of data fast and efficiently.
MaresWare is Free!
When it comes to open source network monitoring tools, the World’s largest organizations turn to Nagios. Nagios monitors the network for problems caused by overloaded data links or network connections, as well as monitoring routers, switches and more. Easily able to monitor availability, uptime and response time of every node on the network, Nagios can deliver the results in a variety of visual representations and reports.
Nmap is one of the most comprehensive sites that is run by Gordon Lyon, (Fyodor) that covers so many different tools and technologies it is best to just go to his site – download, play and learn. Fyodor is a well-known Technologist, writer and teacher. He is one of the GOOD hackers that uses his skills to teach and help network people learn about their world in so many ways. A MUST SEE site for all Bit, Nibble, Byte and Packet Nuts!
NetworkMiner is an open source Network Forensic Analysis Tool (NFAT) for Windows (but also works in Linux / Mac OS X / FreeBSD). NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.
NetworkMiner makes it easy to perform advanced Network Traffic Analysis (NTA) by providing extracted artifacts in an intuitive user interface. The way data is presented not only makes the analysis simpler, it also saves valuable time for the analyst or forensic investigator.
Ntop Open Source Tools:
ntopng - Web-based Traffic and Security Monitoring
PF_RING - High-speed packet processing framework
nDPI - Open Source Deep Packet Inspection Software Toolkit
n2n - Peer-to-peer VPN
Open Source tools from ntop - https://github.com/ntop
Sensu is the open source monitoring event pipeline built to reduce operator burden and make developers and business owners happy. Started in 2011, Sensu’s flexible approach solves the challenges of monitoring hybrid-cloud and ephemeral infrastructures with scalable, automated workflows and integrations with tools you already use. Get started now and feel the #monitoringlove: Learn Sensu Go. Sensu Core is the completely free and open source version of the Sensu monitoring event pipeline.
SmokePing keeps track of your network latency:
Best of breed latency visualisation.
Interactive graph explorer.
Wide range of latency measurement plugins.
Master/Slave System for distributed measurement.
Highly configurable alerting system.
Live Latency Charts with the most 'interesting' graphs.
Free and OpenSource Software written in Perl written by Tobi Oetiker, the creator of MRTG and RRDtool
TraceWrangler is a network capture file toolkit running on Windows (or on Linux, using WINE) that supports PCAP as well as the new PCAPng file format, which is now the standard file format used by Wireshark. The most prominent use case for TraceWrangler is the easy sanitization and anonymization of PCAP and PCAPng files (sometimes called "trace files", "capture files" or "packet captures"), removing or replacing sensitive data while being easy to use.
This is a community website with a mission to help IT people develop Performance & Stability Engineering skills to meet the demands of today’s complex systems. Whether you are a technology, cloud, full-stack or site reliability engineer you'll find great information, tools and techniques right here.
This is the Home of - Transum - TRANSUM adds powerful network and application performance analysis functions to Wireshark
- WorkBench - Have you ever wished you could drive Wireshark like the Sharkfest experts? Workbench integrates tools and data with expert workflow and task automation to allow you to troubleshoot the way the pros do it.
Plus many other Wireshark add on tools for professional data and network analysis
The current version is made for Windows 10, but should still work on 8, 7, and vista. .Net framework v4 is required.
Uses the Windows Native Wifi API or netsh to find access points and get wireless information
GPS Support. Supports COM based NMEA recievers.
Export/Import access points from Vistumbler TXT/VS1/VSZ or Netstumbler TXT/Text NS1
Export access point GPS locations to a google earth kml file or GPX(GPS eXchange format)
Live Google Earth Tracking - Auto KML automatically shows access points in google earth.
Speaks Signal Strength using sound files, windows sound api, or MIDI
Open Source (GPLv2 License / Written in AutoIt Scripting Language)
Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark development thrives thanks to the volunteer contributions of networking experts around the globe and is the continuation of a project started by Gerald Combs in 1998.