I do not know what I am doing yet! But it is my research!
-
Updated
May 22, 2022 - C
I do not know what I am doing yet! But it is my research!
Analysis and Visualization of network traffic from data centres based on trace.pcap file.
AirSentinel is a Python-based cross-platform tool with a PyQt5 GUI for live Wi-Fi scanning and offline PCAP analysis. It detects network details, assigns risk levels, and exports results in JSON, Markdown, or PDF, making it valuable for cybersecurity research and testing.
A comprehensive web application for replaying network packet capture (PCAP) files using tcpreplay. Built with React frontend, Flask backend, and fully containerized with Docker.
Sniffing network traffic with Python for real-time or PCAP analysis.
A command-line companion for in-depth network traffic analysis, enabling security insights and statistical overview from PCAP files.
Professional VoIP diagnostic tool - Analyzes PCAP files and detects one-way audio, NAT issues, call quality problems
PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.
GREP for PCAP files
A lightweight packet analyzer tool featuring a user-friendly GUI interface using Npcap and wxWidgets.
Demonstrating a man-in-the-middle (MITM) attack using ARP spoofing on three Kali Linux VMs in VirtualBox. The attacker (Kali 1) intercepts ping traffic between two victims (Kali 2 and Kali 3) with Ettercap, captures it with Wireshark, and analyzes the PCAP to verify redirection.
A powerful, multi-threaded password cracking tool written in Go with support for multiple hash types, PCAP analysis, and custom transformation rules.
AI-Powered Anomaly Detection System for Network Security. Features a real-time data pipeline for raw PCAP traffic and ML models (Decision Tree, Random Forest, TensorFlow MLP) for detecting attacks.
Files and Writeup-ish for CERT-SE CTF 2025
Blue Team CTF: Recovered deleted security footage from a .pcap file using Wireshark, Python, and FFmpeg. Demonstrates real-world forensic skills in network packet analysis, MJPEG stream extraction, and flag hunting. Challenge from TryHackMe's “Security Footage” room.
A machine learning-based system for detecting anomalies in encrypted network traffic. Supports real-time analysis, multiple detection algorithms, and insightful visualizations.
Análisis de tráfico de red usando Wireshark y K-means en Python. Clasificación de paquetes en clusters y generación de informes automatizados.
A forensic analysis and case study of a network incident involving ARP Spoofing and IP Spoofing, investigated using Wireshark.
IP statistics from PCAP files
Network Traffic Analysis using Wireshark to detect Redline Stealer C2 communications. Includes PCAP analysis, IOCs, and incident report.
Add a description, image, and links to the pcap-analysis topic page so that developers can more easily learn about it.
To associate your repository with the pcap-analysis topic, visit your repo's landing page and select "manage topics."