Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil’s main component is an intuitive GUI that provides access to realtime events, session data, and raw packet captures. Sguil facilitates the practice of Network Security Monitoring and event driven analysis. The Sguil client is written in tcl/tk and can be run on any operating system that supports tcl/tk (including Linux, *BSD, Solaris, MacOS, and Win32).
Permanent link to this article: https://www.darknessgate.com/2015/03/06/sguil/
Categories
- Privacy Tools (96)
- Safe Browsing (16)
- Web Proxies (2)
- Secure Connection (25)
- Secure Deletetion (8)
- Cleaning Tools (21)
- Encryption Tools (25)
- Hiding techniques (13)
- Cloud Encryption (5)
- Anonymity Online (30)
- Android (1)
- Malicious Software Detection (78)
- Anti Malware (5)
- AntiVirus (29)
- Anti Trojan (16)
- Anti KeyLogger (20)
- Anti Spyware (37)
- Anti Rootkits (25)
- Anti Spam (8)
- Anti Phishing (3)
- Anti Stealth (0)
- Process Discovery (15)
- Integrity Checking Tools (15)
- Startup Program Monitor (6)
- System Management (42)
- Backup Software (20)
- Data Recovery (16)
- Registry Monitor (10)
- Network Security (58)
- Firewall (17)
- Vulnerability scanner (1)
- Network Analyzer (22)
- Intrusion Detection Systems (IDS) (6)
- Port Monitor (7)
- Traceroutes Tools (0)
- Anti-Sniffing Tools (6)
- DNS Tools (1)
- Wireless Networks Security (67)
- Web Application Security (22)
- SQL Injunction detection tools (20)
- Website Mirroring Tools (9)
- Linux Security Distro (27)
- Social engineering (4)
- Digital Forensic (97)
- Debuggers (1)
- Memory Imaging (16)
- $MFT Parser (2)
- Integrated Forensic Software (13)
- Encrypted Disk Detector (2)
- Metadata Analyzer (6)
- Registry analysis (7)
- Forensic Live CD/DVD (5)
- Memory Forensics (10)
- Forensic Tools (3)
- Password Recovery (12)
- Hex Editor (12)
- Disk Image (13)
- USB Write Blocker (4)
- Browser Forensic (1)
- Email Forensic (3)
- Forensic User Groups (1)
- Antiforensics (19)
- Learn Programming (28)
- Academic Lectures (100)
- Technical Training (17)
- Tech Tips (1)
- Security News (100)
- Uncategorized (5)
Archive
Data Hiding Techniques in Windows OS
Your Location
Tag Cloud
Android anonymouse anonymouse IM Browser Specific checksum Command Line Tool Commercial Application Computer Forensics Course Lectuers Cyber intelligence Data Hiding Digital Certificates Encryption File System FireWall Framework Freeware Hash Internet Protocols intrusion detection Latest Computer Security News learn programming Linux OS Mac Malware Analysis Mobile Networks Network Backup Network Forensics network management Online Tool open source Password Cracking PC Utilities Portable Version Privacy Safety Online Secure Communication Security learning USB USB flash USB forensic vulnerability scanner Windows OS wireless networks XSS