134 results for “topic:packet-analysis”
Binary data diffing for multiple objects or streams of data
Python-based Comprehensive Network Packet Analysis Library
Easy to use DDoS mitigation with real-time traffic analysis, automatic attack pattern detection, IP blocking via iptables/blackhole routing, and Discord alerts. Detects and mitigates network floods, reflection attacks, and protocol abuse.
Meshtastic SDR Analyzer & Desktop GUI. A tool to analyze the meshtastic network graphically with a simple sdr.
“Protocol Informatics” is a project to design for automatically network protocol reverse engineering based on frame or packet analysis. "PI" is short for “Protocol Informatics”, which introduces local and global sequence alignment algorithms. The PI project is famous in network protocol reverse engineering based on network trace. I am not the author of PI project. However, the previous website storing PI project disappeared. That makes me to open a github issue to keep the codes of PI poject.
Analyzing Zoom Meeting Characteristics and Performance from Packet Captures
Wireshark-MCP,Give your AI assistant a packet analyzer. Drop a .pcap file, ask questions in plain English — get answers backed by real tshark data.
No description provided.
A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybersecurity professionals and enthusiasts.
Captures & Analyses live network traffic in real time to detect suspicious activities using rule-based, MITRE-mapped, and machine-learning techniques.
A simple script to check all Wireless cards connected to your computer for Packet Injection capability
is a powerful PoC for performing a Man-in-the-Middle (MITM) attack to intercept and analyze HTTP and SSL/TLS traffic
A Python-based network packet analyzer using Scapy
Blue Protocol Star Resonance player and developer focused toolkit - packet analysis, data extraction, and game research utilities for BPSR.
capture_rtsp.sh is a Bash script for capturing RTSP packets. The script offers functionality to retrieve and validate RTSP URIs from command line arguments, as well as to manage logs and captured data.
A legal, PyQt6-based cybersecurity dashboard for consent-based network traffic analysis on Windows. Captures packet metadata only (IPs, ports, protocols) with filter-driven monitoring and IP tracking - no decryption or MITM. Intended for educational, debugging, and defensive security use on authorized systems only.
Master essential networking concepts and skills with hands-on labs. This course covers network fundamentals, implementation, operations, security, and troubleshooting, preparing you for the CompTIA Network+ certification (N10-009).
Multicast Sequence Decoder
OTARIS traffic analyzer
Modbus Attack Tool for Remote Industrial eXploitation (M.A.T.R.I.X) is a comprehensive security testing tool for Modbus TCP protocol implementations.
Modular ICS/OT cybersecurity toolkit for Modbus/TCP, Siemens S7Comm, and DNP3. Generates JSON/HTML reports and executive dashboards from PCAPs and safe Modbus scans. Includes sample PCAPs and ModbusPal for testing.
This IDS focuses on detecting intrusion attempts by matching patterns in network data (such as suspicious strings in payloads or requests). It integrates the Knuth-Morris-Pratt (KMP) string-search algorithm for efficient pattern matching while also using auxiliary methods such as hashing and tries for indexing or rule-based detection.
Step-by-step guide to identifying and fixing common TCP issues using Wireshark — retransmissions, resets, zero windows, handshake failures, and more.
TWSNMP for Kiosk
Comprehensive security testing framework for Model Context Protocol (MCP) servers. Automated vulnerability detection with Docker isolation, network traffic analysis, and AI-powered threat assessment.
Network Hound is a network packet sniffer that captures and analyzes network packets on a given interface.
High-performance network reconnaissance and port scanning framework written in Rust. Fast TCP SYN scanner with service detection, OS fingerprinting and Masscan-like speed.
IP Address Investigation and WHOIS Intelligence
Z-Shark is a high-performance, CLI-first network forensics platform designed for advanced anomaly detection. Leveraging mathematical models such as Fast Fourier Transform (FFT), Shannon Entropy, and Z-Score statistical profiling, it uncovers hidden threats like C2 beaconing, DGA, and low-and-slow DDoS attacks in PCAP traffic.
Introduction to information security, exploiting a vulnerable ISO.