Wireshark
Snort
NetworkMiner
Zeek
Brim
Threat hunting with Brim.
Log investigation, pcap analysis and threat hunting.
Brim in a nutshell
Use cases
Malware C2 detection
Crypto mining