Hand's on use of Network Security and Traffic Analysis concepts to spot and probe network anomalies using industry tools and techniques.
-
Updated
Nov 5, 2025
Hand's on use of Network Security and Traffic Analysis concepts to spot and probe network anomalies using industry tools and techniques.
Simulated and detected a stealthy insider threat ‘Alex’, who moved from file snooping to SSH brute-forcing. Includes PCAPs, Zeek logs, NetworkMiner analysis, and a full incident report.
Complete security incident lifecycle from malware behavioral analysis to NIST incident response and phishing credential harvesting simulation
Add a description, image, and links to the networkminer topic page so that developers can more easily learn about it.
To associate your repository with the networkminer topic, visit your repo's landing page and select "manage topics."