The Network Sniffer, a Python-based tool, offers real-time packet capture and analysis, providing insights into various network protocols.
- Captures and analyzes Ethernet frames to extract MAC addresses and protocol information.
- Parses IP packets to determine source and destination IP addresses, TTL (Time-To-Live), and transport layer protocol.
- Supports parsing of ICMP, TCP, and UDP packets to extract specific protocol details.
- Provides real-time updates on captured packets, displaying packet details and protocol information as they are intercepted.
- Includes packet statistics functionality to track the count of packets per protocol and display statistics every 10 seconds.
- Python 3.11
- Terminal or Command Prompt
-
Clone the repository
git clone https://github.com/Melvin-Shalom/Packet_Sniffer.git
-
Navigate to the project directory
cd Packet_Sniffer/
-
Create & activate the virtual environment
python -m venv venv source venv/bin/activate # For Linux/macOS .\venv\Scripts\activate # For Windows
-
Install dependencies
pip install -r requirements.txt
-
Run the packet sniffer script
sudo venv/bin/python3 main.py # For Linux/macOS python main.py # For Windows
Run the script to capture and analyze packets. Stats are printed every 10 seconds, providing protocol-wise packet distribution.
- Add GUI for live traffic visualization
- Export packet logs in .pcap format
- Filter packets by IP, port, or protocol
- Integrate with threat intelligence APIs
Built with ❤️ and ☕ by Melvin Shalom
Licensed under the MIT License