Skip to content

Capture and analyze network traffic effortlessly. πŸ“‘

License

Notifications You must be signed in to change notification settings

RIZZZIOM/pcapper

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ› οΈ PCAPPER

Pcapper is a Python-based tool designed for learning and experimentation with network traffic capture and analysis. πŸ“‘ Built with simplicity and functionality in mind, it allows users to sniff network traffic and analyze capture files with powerful features. Whether you're exploring protocols, detecting SYN flood attacks, or extracting HTTP payloads, Pcapper has you covered! πŸš€

✨ Features

  • πŸ“‘ Sniff Network Traffic:

    • Capture and filter packets directly from the network.
  • πŸ” Analyze Capture Files:

    • Extract and summarize traffic for a specific protocol.
    • Detect potential SYN flood attacks.
    • Extract HTTP payloads.
    • Generate detailed TCP/UDP conversation summaries.
  • πŸ“ Supported Formats:

    • Analyze .pcap and .pcapng files with ease.

βš™οΈ Installation

  1. Clone the repository:
git clone https://github.com/RIZZZIOM/pcapper.git
cd pcapper
  1. Install the required dependencies:
pip install -r requirements.txt
  1. Run the tool:
python pcapper.py

πŸš€ Usage

Using PCAPper is simple and intuitive! Follow these steps to capture and analyze network traffic.

πŸ–₯️ Getting Started

  • Run the tool by executing.
python pcapper.py
  • You'll be greeted with a CLI dashboard.

πŸ“‘ Capturing Packets

  1. Capture All Packets: Select the option to capture all packets from the specified network interface.

  1. Capture Traffic Of Specific Protocol: Filter packets by specifying a protocol (e.g., TCP or UDP) and an optional port.

πŸ” Analyzing Captured Data

  • Load a previously captured file (supports .pcap and .pcapng formats).
  • Choose from the following analysis options:
    • Summarize Traffic: Extract and summarize traffic for a specific protocol.
    • Detect SYN Flood: Identify potential SYN flood attacks in the data.
    • Extract HTTP Payload: Retrieve and view HTTP payloads from packets.
    • Conversation Summary: Analyze communication between source and destination IPs with packet counts and data sizes.

🀝 Contributing

Contributions are welcome! Feel free to fork the repo, make your changes, and submit a pull request. If you’re adding features, please try to include relevant tests, and keep things consistent with the existing style.

πŸ“œ License

This project is licensed under the MIT License. See the LICENSE file for details.


About

Capture and analyze network traffic effortlessly. πŸ“‘

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages