Pcapper is a Python-based tool designed for learning and experimentation with network traffic capture and analysis. π‘ Built with simplicity and functionality in mind, it allows users to sniff network traffic and analyze capture files with powerful features. Whether you're exploring protocols, detecting SYN flood attacks, or extracting HTTP payloads, Pcapper has you covered! π
-
π‘ Sniff Network Traffic:
- Capture and filter packets directly from the network.
-
π Analyze Capture Files:
- Extract and summarize traffic for a specific protocol.
- Detect potential SYN flood attacks.
- Extract HTTP payloads.
- Generate detailed TCP/UDP conversation summaries.
-
π Supported Formats:
- Analyze
.pcap
and.pcapng
files with ease.
- Analyze
- Clone the repository:
git clone https://github.com/RIZZZIOM/pcapper.git
cd pcapper
- Install the required dependencies:
pip install -r requirements.txt
- Run the tool:
python pcapper.py
Using PCAPper is simple and intuitive! Follow these steps to capture and analyze network traffic.
- Run the tool by executing.
python pcapper.py
- You'll be greeted with a CLI dashboard.
- Capture All Packets: Select the option to capture all packets from the specified network interface.
- Capture Traffic Of Specific Protocol: Filter packets by specifying a protocol (e.g., TCP or UDP) and an optional port.
- Load a previously captured file (supports
.pcap
and.pcapng
formats). - Choose from the following analysis options:
- Summarize Traffic: Extract and summarize traffic for a specific protocol.
- Detect SYN Flood: Identify potential SYN flood attacks in the data.
- Extract HTTP Payload: Retrieve and view HTTP payloads from packets.
- Conversation Summary: Analyze communication between source and destination IPs with packet counts and data sizes.
Contributions are welcome! Feel free to fork the repo, make your changes, and submit a pull request. If youβre adding features, please try to include relevant tests, and keep things consistent with the existing style.
This project is licensed under the MIT License. See the LICENSE file for details.