Analysis and Visualization of network traffic from data centres based on trace.pcap file.
-
Updated
May 19, 2023 - Python
Analysis and Visualization of network traffic from data centres based on trace.pcap file.
I do not know what I am doing yet! But it is my research!
AirSentinel is a Python-based cross-platform tool with a PyQt5 GUI for live Wi-Fi scanning and offline PCAP analysis. It detects network details, assigns risk levels, and exports results in JSON, Markdown, or PDF, making it valuable for cybersecurity research and testing.
A comprehensive web application for replaying network packet capture (PCAP) files using tcpreplay. Built with React frontend, Flask backend, and fully containerized with Docker.
Network Traffic Analysis using Wireshark to detect Redline Stealer C2 communications. Includes PCAP analysis, IOCs, and incident report.
Sniffing network traffic with Python for real-time or PCAP analysis.
A command-line companion for in-depth network traffic analysis, enabling security insights and statistical overview from PCAP files.
PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.
GREP for PCAP files
Professional VoIP diagnostic tool - Analyzes PCAP files and detects one-way audio, NAT issues, call quality problems
把 Wireshark/tshark 封装成结构化 MCP Tools:让智能体对 PCAP 做过滤、时间线、下钻、会话跟踪与导表,输出可控且安全可审计。 Turn Wireshark/tshark into structured MCP tools for PCAP troubleshooting: filtering, timelines, drill-down, session follow, and packet list exports with controlled output and safety boundaries.
A lightweight packet analyzer tool featuring a user-friendly GUI interface using Npcap and wxWidgets.
Demonstrating a man-in-the-middle (MITM) attack using ARP spoofing on three Kali Linux VMs in VirtualBox. The attacker (Kali 1) intercepts ping traffic between two victims (Kali 2 and Kali 3) with Ettercap, captures it with Wireshark, and analyzes the PCAP to verify redirection.
A powerful, multi-threaded password cracking tool written in Go with support for multiple hash types, PCAP analysis, and custom transformation rules.
Files and Writeup-ish for CERT-SE CTF 2025
Blue Team CTF: Recovered deleted security footage from a .pcap file using Wireshark, Python, and FFmpeg. Demonstrates real-world forensic skills in network packet analysis, MJPEG stream extraction, and flag hunting. Challenge from TryHackMe's “Security Footage” room.
AI-Powered Anomaly Detection System for Network Security. Features a real-time data pipeline for raw PCAP traffic and ML models (Decision Tree, Random Forest, TensorFlow MLP) for detecting attacks.
Análisis de tráfico de red usando Wireshark y K-means en Python. Clasificación de paquetes en clusters y generación de informes automatizados.
A forensic analysis and case study of a network incident involving ARP Spoofing and IP Spoofing, investigated using Wireshark.
A machine learning-based system for detecting anomalies in encrypted network traffic. Supports real-time analysis, multiple detection algorithms, and insightful visualizations.
Add a description, image, and links to the pcap-analysis topic page so that developers can more easily learn about it.
To associate your repository with the pcap-analysis topic, visit your repo's landing page and select "manage topics."