{"id":19597,"date":"2021-10-28T12:25:22","date_gmt":"2021-10-28T12:25:22","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=19597"},"modified":"2021-10-28T12:25:27","modified_gmt":"2021-10-28T12:25:27","slug":"networkit","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/networkit\/","title":{"rendered":"Networkit : A Growing Open-Source Toolkit For Large-Scale Network Analysis"},"content":{"rendered":"\n<p><strong>NetworKit<\/strong>&nbsp;is an open-source tool suite for high-performance network analysis. Its aim is to provide tools for the analysis of large networks in the size range from thousands to billions of edges. For this purpose, it implements efficient graph algorithms, many of them parallel to utilize multicore architectures. These are meant to compute standard measures of network analysis. NetworKit is focused on scalability and comprehensiveness. NetworKit is also a testbed for algorithm engineering and contains novel algorithms from recently published research (see list of publications below).<\/p>\n\n\n\n<p>NetworKit is a Python module. High-performance algorithms are written in C++ and exposed to Python via the Cython toolchain. Python in turn gives us the ability to work interactively and a rich environment of tools for data analysis and scientific computing. Furthermore, NetworKit&#8217;s core can be built and used as a native library if needed.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/networkit\/networkit#requirements\"><\/a><strong>Requirements<\/strong><\/p>\n\n\n\n<p>You will need the following software to install NetworKit as a python package:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>A modern C++ compiler, e.g.:&nbsp;g++&nbsp;(&gt;= 6.1),&nbsp;clang++&nbsp;(&gt;= 3.9) or MSVC (&gt;= 14.13)<\/li><li>OpenMP for parallelism (usually ships with the compiler)<\/li><li>Python3 (3.6 or higher is supported)<ul><li>Development libraries for Python3. The package name depends on your distribution. Examples:<ul><li>Debian\/Ubuntu:&nbsp;<code><strong>apt-get install python3-dev<\/strong><\/code><\/li><li>RHEL\/CentOS:&nbsp;<code><strong>dnf install python3-devel<\/strong><\/code><\/li><li>Windows: Use the official release installer from&nbsp;www.python.org<\/li><\/ul><\/li><\/ul><\/li><li>Pip<\/li><li>CMake&nbsp;version 3.6 or higher (Advised to use system packages if available. Alternative:&nbsp;<code><strong>pip3 install cmake<\/strong><\/code>)<\/li><li>Build system:&nbsp;Make&nbsp;or&nbsp;Ninja<\/li><li>Cython version 0.29 or higher (e.g.,&nbsp;<code><strong>pip3 install cython<\/strong><\/code>)<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/networkit\/networkit#install\"><\/a><strong>Install<\/strong><\/p>\n\n\n\n<p>In order to use NetworKit, you can either install it via package managers or build the Python module from source.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/networkit\/networkit#install-via-package-manager\"><\/a><strong>Install via package manager<\/strong><\/p>\n\n\n\n<p>While the most recent version is in general available for all package managers, the number of older downloadable versions differ.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/networkit\/networkit#pip\"><\/a>pip<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>pip3 install [&#8211;user] networkit<\/strong><\/p>\n\n\n\n<p>conda (channel conda-forge)<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>conda config &#8211;add channels conda-forge<br>conda install networkit [-c conda-forge]<\/strong><\/p>\n\n\n\n<p>brew<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>brew install networkit<\/strong><\/p>\n\n\n\n<p>spack<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>spack install py-networkit<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Building the Python module from source<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>git clone https:\/\/github.com\/networkit\/networkit networkit<br>cd networkit<br>python3 setup.py build_ext [-jX]<br>pip3 install -e .<\/strong><\/p>\n\n\n\n<p>The script will call&nbsp;<code><strong>cmake<\/strong><\/code>&nbsp;and&nbsp;<strong><code>ninja<\/code>&nbsp;(<code>make<\/code><\/strong>&nbsp;as fallback) to compile NetworKit as a library, build the extensions and copy it to the top folder. By default, NetworKit will be built with the amount of available cores in optimized mode. It is possible the add the option&nbsp;<code><strong>-jN<\/strong><\/code>&nbsp;the number of threads used for compilation.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/networkit\/networkit#usage-example\"><\/a><strong>Usage Example<\/strong><\/p>\n\n\n\n<p>To get an overview and learn about NetworKit&#8217;s different functions\/classes, have a look at our interactive&nbsp;notebooks-section, especially the&nbsp;Networkit UserGuide. Note: To view and edit the computed output from the notebooks, it is recommended to use&nbsp;Jupyter Notebook. This requires the prior installation of NetworKit. You should really check that out before start working on your network analysis.<\/p>\n\n\n\n<p>We also provide a Binder-instance of our notebooks. To access this service, you can either click on the badge at the top or follow this&nbsp;link. Disclaimer: Due to rebuilds of the underlying image, it can takes some time until your Binder instance is ready for usage.<\/p>\n\n\n\n<p>If you only want to see in short how NetworKit is used &#8211; the following example provides a climpse at that. Here we generate a random hyperbolic graph with 100k nodes and compute its communities with the PLM method:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>import networkit as nk<br>g = nk.generators.HyperbolicGenerator(1e5).generate()<br>communities = nk.community.detectCommunities(g, inspect=True)<br>PLM(balanced,pc,turbo) detected communities in 0.14577102661132812 [s]<br>solution properties:<br>communities 4536<br>min community size 1<br>max community size 2790<br>avg. community size 22.0459<br>modularity 0.987243<br>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;- &#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Install the C++ Core only<\/strong><\/p>\n\n\n\n<p>In case you only want to work with NetworKit&#8217;s C++ core, you can either install it via package managers or build it from source.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/networkit\/networkit#install-c-core-via-package-manager\"><\/a><strong>Install C++ core via package manager<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/networkit\/networkit#conda-channel-conda-forge-1\"><\/a>conda (channel conda-forge)<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>conda config &#8211;add channels conda-forge<br>conda install libnetworkit [-c conda-forge]<\/strong><\/p>\n\n\n\n<p>brew<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>brew install libnetworkit<\/strong><\/p>\n\n\n\n<p>spack<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>spack install libnetworkit<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Building the C++ core from source<\/strong><\/p>\n\n\n\n<p>We recommend&nbsp;CMake&nbsp;and your preferred build system for building the C++ part of NetworKit.<\/p>\n\n\n\n<p>The following description shows how to use&nbsp;CMake&nbsp;in order to build the C++ Core only:<\/p>\n\n\n\n<p>First you have to create and change to a build directory: (in this case named&nbsp;<code><strong>build<\/strong><\/code>)<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>mkdir build<br>cd build<\/strong><\/p>\n\n\n\n<p>Then call&nbsp;CMake&nbsp;to generate files for the&nbsp;<code><strong>make<\/strong><\/code>&nbsp;build system, specifying the directory of the root&nbsp;<code><strong>CMakeLists.txt<\/strong><\/code>&nbsp;file (e.g.,&nbsp;<code><strong>..<\/strong><\/code>). After this&nbsp;<code><strong>make<\/strong><\/code>&nbsp;is called to start the build process:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>cmake ..<br>make -jX<\/strong><\/p>\n\n\n\n<p>o speed up the compilation with make a multi-core machine, you can append&nbsp;<code><strong>-jX<\/strong><\/code>&nbsp;where X denotes the number of threads to compile with.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/networkit\/networkit#use-networkit-as-a-library\"><\/a><strong>Use NetworKit as a library<\/strong><\/p>\n\n\n\n<p>This paragraph explains how to use the NetworKit core C++ library in case it has been built from source. For how to use it when installed via package managers, best refer to the official documentation (<a href=\"https:\/\/brew.sh\/\">brew<\/a>,&nbsp;<a href=\"https:\/\/docs.conda.io\/\">conda<\/a>,&nbsp;<a href=\"https:\/\/spack.readthedocs.io\/en\/latest\">spack<\/a>).<\/p>\n\n\n\n<p>In order to use the previous compiled networkit library, you need to have it installed, and link it while compiling your project. Use these instructions to compile and install NetworKit in&nbsp;<code>\/usr\/local<\/code>:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>cmake ..<br>make -jX install<\/strong><\/p>\n\n\n\n<p>Once NetworKit has been installed, you can use include directives in your C++-application as follows:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong># include<\/strong> <strong>&lt;networkit\/graph\/Graph.hpp<\/strong>&gt;<\/p>\n\n\n\n<p>You can compile your source as follows:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>g++ my_file.cpp -lnetworkit<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Unit Tests<\/strong><\/p>\n\n\n\n<p>Building and running NetworKit unit tests is not mandatory. However, as a developer you might want to write and run unit tests for your code, or if you experience any issues with NetworKit, you might want to check if NetworKit runs properly. The unit tests can only be run from a clone or copy of the repository and not from a pip installation. In order to run the unit tests, you need to compile them first. This is done by setting the&nbsp;CMake&nbsp;<code><strong>NETWORKI_BUILD_TESTS<\/strong><\/code>&nbsp;flag to&nbsp;<code><strong>ON<\/strong><\/code>:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>cmake -DNETWORKIT_BUILD_TESTS=ON <\/strong>..<\/p>\n\n\n\n<p>Unit tests are implemented using GTest macros such as&nbsp;<code><strong>TEST_F(CentralityGTest, testBetweennessCentrality)<\/strong><\/code>. Single tests can be executed with:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>.\/networkit_tests &#8211;gtest_filter=CentralityGTest.testBetweennessCentrality<\/strong><\/p>\n\n\n\n<p>Additionally, one can specify the level of the logs outputs by adding&nbsp;<code><strong>--loglevel &lt;log_level&gt;<\/strong><\/code>; supported log levels are:&nbsp;<code><strong>TRACE<\/strong><\/code>,&nbsp;<code><strong>DEBUG<\/strong><\/code>,&nbsp;<strong><code>INFO<\/code>,<\/strong>&nbsp;<code><strong>WARN<\/strong><\/code>,&nbsp;<code><strong>ERROR<\/strong><\/code>, and&nbsp;<code><strong>FATAL<\/strong><\/code>.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Compiling with address\/leak sanitizers<\/strong><\/p>\n\n\n\n<p>Sanitizers are great tools to debug your code. NetworKit provides additional&nbsp;Cmake&nbsp;flags to enable address, leak, and undefined behavior sanitizers. To compile your code with sanitizers, set the&nbsp;CMake&nbsp;<code><strong>NETWORKIT_WITH_SANITIZERS<\/strong><\/code>&nbsp;to either&nbsp;<code><strong>address<\/strong><\/code>&nbsp;or&nbsp;<code><strong>leak<\/strong><\/code>:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>cmake -DNETWORKIT_WITH_SANITIZERS=leak ..<\/strong><\/p>\n\n\n\n<p>By setting this flag to&nbsp;<code><strong>address<\/strong><\/code>, your code will be compiled with the&nbsp;<code><strong>address<\/strong><\/code>&nbsp;and the&nbsp;<code><strong>undefined<\/strong><\/code>&nbsp;sanitizers. Setting it to&nbsp;<code><strong>leak<\/strong><\/code>&nbsp;also adds the&nbsp;<code><strong>leak<\/strong><\/code>&nbsp;sanitizer.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/networkit\/networkit\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>NetworKit&nbsp;is an open-source tool suite for high-performance network analysis. Its aim is to provide tools for the analysis of large networks in the size range from thousands to billions of edges. For this purpose, it implements efficient graph algorithms, many of them parallel to utilize multicore architectures. These are meant to compute standard measures of [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":19631,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4369,4370,4368,2330],"class_list":["post-19597","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-large-scale","tag-network-analysis","tag-networkit","tag-open-source"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Networkit : A Growing Open-Source Toolkit For Large-Scale Network<\/title>\n<meta name=\"description\" content=\"NetworKit\u00a0is an open-source tool suite for high-performance network analysis. Its aim is to provide tools for the analysis of large networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/networkit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Networkit : A Growing Open-Source Toolkit For Large-Scale Network\" \/>\n<meta property=\"og:description\" content=\"NetworKit\u00a0is an open-source tool suite for high-performance network analysis. Its aim is to provide tools for the analysis of large networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/networkit\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-28T12:25:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-28T12:25:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/networkit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/networkit\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Networkit : A Growing Open-Source Toolkit For Large-Scale Network Analysis\",\"datePublished\":\"2021-10-28T12:25:22+00:00\",\"dateModified\":\"2021-10-28T12:25:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/networkit\/\"},\"wordCount\":1121,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/networkit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347\",\"keywords\":[\"Large-Scale\",\"Network Analysis\",\"Networkit\",\"Open-source\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/networkit\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/networkit\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/networkit\/\",\"name\":\"Networkit : A Growing Open-Source Toolkit For Large-Scale Network\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/networkit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/networkit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347\",\"datePublished\":\"2021-10-28T12:25:22+00:00\",\"dateModified\":\"2021-10-28T12:25:27+00:00\",\"description\":\"NetworKit\u00a0is an open-source tool suite for high-performance network analysis. Its aim is to provide tools for the analysis of large networks.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/networkit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/networkit\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347\",\"width\":\"1347\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Networkit : A Growing Open-Source Toolkit For Large-Scale Network","description":"NetworKit\u00a0is an open-source tool suite for high-performance network analysis. Its aim is to provide tools for the analysis of large networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/networkit\/","og_locale":"en_US","og_type":"article","og_title":"Networkit : A Growing Open-Source Toolkit For Large-Scale Network","og_description":"NetworKit\u00a0is an open-source tool suite for high-performance network analysis. Its aim is to provide tools for the analysis of large networks.","og_url":"https:\/\/kalilinuxtutorials.com\/networkit\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-10-28T12:25:22+00:00","article_modified_time":"2021-10-28T12:25:27+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/networkit\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/networkit\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Networkit : A Growing Open-Source Toolkit For Large-Scale Network Analysis","datePublished":"2021-10-28T12:25:22+00:00","dateModified":"2021-10-28T12:25:27+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/networkit\/"},"wordCount":1121,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/networkit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347","keywords":["Large-Scale","Network Analysis","Networkit","Open-source"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/networkit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/networkit\/","url":"https:\/\/kalilinuxtutorials.com\/networkit\/","name":"Networkit : A Growing Open-Source Toolkit For Large-Scale Network","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/networkit\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/networkit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347","datePublished":"2021-10-28T12:25:22+00:00","dateModified":"2021-10-28T12:25:27+00:00","description":"NetworKit\u00a0is an open-source tool suite for high-performance network analysis. Its aim is to provide tools for the analysis of large networks.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/networkit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/networkit\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347","width":"1347","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjER7ac6p5knKD58GQXhbYAP8qWEJf06Lz2FNLwa1grnNU88OqIoY4elDp46m_nwmBzU9aJa4fF8BXJuDA6K6aED4BPc7XbhhjI5pp_9nBxyi1avKXCXLbmClJ2Ob_JNbMdsK25DWETnuEWZE3ye6qzBQHQIZKJPyp05-JVEqvV3sg87eNIVy8tp1vB=s1347","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":26832,"url":"https:\/\/kalilinuxtutorials.com\/aura\/","url_meta":{"origin":19597,"position":0},"title":"Aura : Python Source Code Auditing And Static Analysis On A Large Scale","author":"R K","date":"September 11, 2022","format":false,"excerpt":"Aura is a static analysis framework developed as a response to the ever-increasing threat of malicious packages and vulnerable code published on PyPI. Project goals: provide an automated monitoring system over uploaded packages to PyPI, alert on anomalies that can either indicate an ongoing attack or vulnerabilities in the codeenable\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh9uJ2T8s7Id3KreDoShm1q3vk8fUYf44jfdhcpQq2MZxAelf3HJ13NibzAvZybuEnB7CbrmZhRpKABaqHqcjTjO1uPieATRd1eHgyrIowHGUVfrUWnlv6G3lq4k7-bxlgC5i32LtLpg8QvUJcz3KFLa026WAB688kYi4Ar3eVybSdDcXnI9Z1AdxJx\/s728\/Aura-Python-Source-Code-Auditing-And-Static-Analysis-On.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh9uJ2T8s7Id3KreDoShm1q3vk8fUYf44jfdhcpQq2MZxAelf3HJ13NibzAvZybuEnB7CbrmZhRpKABaqHqcjTjO1uPieATRd1eHgyrIowHGUVfrUWnlv6G3lq4k7-bxlgC5i32LtLpg8QvUJcz3KFLa026WAB688kYi4Ar3eVybSdDcXnI9Z1AdxJx\/s728\/Aura-Python-Source-Code-Auditing-And-Static-Analysis-On.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh9uJ2T8s7Id3KreDoShm1q3vk8fUYf44jfdhcpQq2MZxAelf3HJ13NibzAvZybuEnB7CbrmZhRpKABaqHqcjTjO1uPieATRd1eHgyrIowHGUVfrUWnlv6G3lq4k7-bxlgC5i32LtLpg8QvUJcz3KFLa026WAB688kYi4Ar3eVybSdDcXnI9Z1AdxJx\/s728\/Aura-Python-Source-Code-Auditing-And-Static-Analysis-On.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh9uJ2T8s7Id3KreDoShm1q3vk8fUYf44jfdhcpQq2MZxAelf3HJ13NibzAvZybuEnB7CbrmZhRpKABaqHqcjTjO1uPieATRd1eHgyrIowHGUVfrUWnlv6G3lq4k7-bxlgC5i32LtLpg8QvUJcz3KFLa026WAB688kYi4Ar3eVybSdDcXnI9Z1AdxJx\/s728\/Aura-Python-Source-Code-Auditing-And-Static-Analysis-On.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":32260,"url":"https:\/\/kalilinuxtutorials.com\/awesome-security\/","url_meta":{"origin":19597,"position":1},"title":"Awesome Security &#8211; A Comprehensive Guide To Tools And Resources For Unlocking Digital Safety","author":"Varshini","date":"March 11, 2024","format":false,"excerpt":"A collection of awesome software, libraries, documents, books, resources and cool stuff about security. Inspired by\u00a0awesome-php,\u00a0awesome-python. Thanks to all\u00a0contributors, you're awesome and wouldn't be possible without you! The goal is to build a categorized community-driven collection of very well-known resources. Awesome Security Network Scanning \/ Pentesting Monitoring \/ Logging IDS\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDCY_P_WCdx-sIy9IKcYFKo65-LloxgwXpMLKs0PwVOL2yGelMKfASEVgVpMYhGshXNMel0pusBmAQ7w02u0-xEYTiNCJbRmCtY2OsrSXPRVUbXa4oGxpGhEpQZDvLMkItJC1MPH9lGYEFjWcdvW7uMWTrWU_0hO454wYvexHX5V8FkUS_XX7c9ceJvP9_\/s16000\/Awesome%20AppSec%20%282%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32825,"url":"https:\/\/kalilinuxtutorials.com\/forensic\/","url_meta":{"origin":19597,"position":2},"title":"Forensic &#8211; Detecting Hackers With PCAP Data","author":"Varshini","date":"April 23, 2024","format":false,"excerpt":"This program discusses the development of a machine learning (ML) program designed to identify specific hacking activities using forensic evidence from PCAP files, which are data files created by network analyzers like Wireshark. These files capture packet data across various layers of the Open Systems Interconnection (OSI) model, providing a\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSGDBpoOze9WY064gT8KENJITBo4XruaUqo6KeOYVAfUeLDQnEUlO-qyHMs3HdkAlHLC3jFBW45VKuzKar9jc6A84iO0RUV8HLzaxGXvXWILK6G-IPSy9m0Ky46XhUs583coBVTCZYsd_mQ6UmqXj-avDr01Msy7nl8bTSitElNhXMTBI26SXnzGsh8_vf\/s16000\/Forensic%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32281,"url":"https:\/\/kalilinuxtutorials.com\/awesome-malware-analysis\/","url_meta":{"origin":19597,"position":3},"title":"Awesome Malware Analysis &#8211; The Ultimate Resource For Tools, Techniques, And Insights","author":"Varshini","date":"March 12, 2024","format":false,"excerpt":"A curated list of awesome malware analysis tools and resources. Inspired by\u00a0awesome-python\u00a0and\u00a0awesome-php. Malware Collection Anonymizers Honeypots Malware Corpora Open Source Threat Intelligence Tools Other Resources Detection and Classification Online Scanners and Sandboxes Domain Analysis Browser Malware Documents and Shellcode File Carving Deobfuscation Debugging and Reverse Engineering Network Memory Forensics Windows\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjZeEhaeyqzFUU38GWT2_mG2oknyoqS_l-nsfDc39vngPF2fpXmbr67gE2UQ_8mAA1is22ljPe8wRg8uPtnoIvPnvkKfN6MdUGZdcK3r-hx0asysxy1r7h_vcLmFXwjdlKoCAaJcx-CIUEz7vl_syFiQuyUwc101VaN9RgTUSrbNE7fvOCk7ijeQOhofLB1\/s16000\/Awesome%20Malware%20Analysis%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32118,"url":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/","url_meta":{"origin":19597,"position":4},"title":"Nmap Analysis Tool &#8211; Enhancing Network Security Through Advanced Analysis And Reporting","author":"Varshini","date":"February 23, 2024","format":false,"excerpt":"This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two things, compare two Nmap XML files to create a spreadsheet that compares IPs, ports and services between the files, and create a markdown report using GPT. Screenshots Features Comprehensive Nmap\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20%284%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20%284%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20%284%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20%284%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20%284%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20%284%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3590,"url":"https:\/\/kalilinuxtutorials.com\/imaginaryc2-network-analysis-malware\/","url_meta":{"origin":19597,"position":5},"title":"ImaginaryC2:Python Tool Help In Network Behavioral Analysis Of Malware","author":"R K","date":"January 18, 2019","format":false,"excerpt":"ImaginaryC2 is a python tool which aims to help in the behavioral (network) analysis of malware. It hosts a HTTP server which captures HTTP requests towards selectively chosen domains\/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses\/served payloads. By using this tool, an analyst can\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/01\/Imaginary-C2-1-1024x721.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/01\/Imaginary-C2-1-1024x721.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/01\/Imaginary-C2-1-1024x721.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/01\/Imaginary-C2-1-1024x721.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/19597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=19597"}],"version-history":[{"count":35,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/19597\/revisions"}],"predecessor-version":[{"id":20055,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/19597\/revisions\/20055"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/19631"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=19597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=19597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=19597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}