M1
m1tk4/wireshark-scte
Collection of WireShark dissectors for several SCTE protocols like SCTE-104, SCTE-35 etc.
Wireshark SCTE Dissectors
Wireshark/TShark Lua dissectors for SCTE (Society of Cable Telecommunications Engineers) protocols.
Supported Protocols
- SCTE-104 (2023) - Automation System to Compression System Communications over TCP
- Additional SCTE protocols coming soon
Features
- Full SCTE-104 message dissection including:
- Init and alive messages
- Splice requests with SCTE-35 descriptors
- Time signal requests
- Segmentation descriptors with all UPID types
- Detailed bit-level field breakdown
- Human-readable timestamps (UTC with microseconds)
- Comprehensive value-to-name mappings for all operation codes and types
- Compatible with Wireshark 3.x and 4.x
Installation
Windows
One-line install (PowerShell):
mkdir "$env:APPDATA\Wireshark\plugins" -Force | Out-Null; iwr https://github.com/m1tk4/wireshark-scte/releases/latest/download/scte104.lua -OutFile "$env:APPDATA\Wireshark\plugins\scte104.lua"Manual install:
- Download scte104.lua
- Copy to
%APPDATA%\Wireshark\plugins\(typicallyC:\Users\YourName\AppData\Roaming\Wireshark\plugins\) - Restart Wireshark
macOS
One-line install (Terminal):
mkdir -p ~/.local/lib/wireshark/plugins && curl -L https://github.com/m1tk4/wireshark-scte/releases/latest/download/scte104.lua -o ~/.local/lib/wireshark/plugins/scte104.luaManual install:
- Download scte104.lua
- Copy to
~/.local/lib/wireshark/plugins/ - Restart Wireshark
Linux
One-line install (bash/zsh):
mkdir -p ~/.local/lib/wireshark/plugins && curl -L https://github.com/m1tk4/wireshark-scte/releases/latest/download/scte104.lua -o ~/.local/lib/wireshark/plugins/scte104.luaManual install:
- Download scte104.lua
- Copy to
~/.local/lib/wireshark/plugins/or/usr/lib/wireshark/plugins/ - Restart Wireshark
Usage
Once installed, the dissector automatically decodes SCTE-104 traffic on TCP port 5167. To capture or analyze:
- Start Wireshark and capture traffic on the network interface
- Apply display filter:
scte104 - SCTE-104 messages will be automatically dissected and displayed
TShark usage:
tshark -r capture.pcap -Y scte104 -O scte104Verification
To verify the plugin is loaded:
- Open Wireshark
- Go to Help → About Wireshark → Plugins
- Search for "scte104" - you should see it listed
Or check from command line:
tshark -G plugins | grep scte104Development
This project includes a complete test infrastructure using Node.js and Mocha:
npm install
npm test # Run all tests
npm run watch-sample <file> # Watch mode for development
npm run update-expected <file> # Update expected test outputs
npm run wireshark # Launch Wireshark with all pluginsStandards
- ANSI/SCTE 104 2023 - Automation System to Compression System Communications API
- ANSI/SCTE 35 2023r1 - Digital Program Insertion Cueing Message
License
MIT License - see LICENSE file for details
Contributing
Contributions welcome! Please feel free to submit issues or pull requests.
On this page
Contributors
Latest Release
v1.0.0January 14, 2026MIT License
Created January 8, 2026
Updated March 9, 2026
