Skip to content

foxhackerzdevs/packet-auditor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

12 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ“‘ Bare-Bones Packet Auditor v1.1.2

Philosophy: Simple β€’ Practical β€’ Reliable

A lightweight command-line network packet auditing tool built with Python and Scapy. It captures live network traffic and displays concise, human-readable metadata in real time.


πŸ“– Introduction

Bare-Bones Packet Auditor is designed for developers, students, and security enthusiasts who need a minimal yet effective way to observe network traffic.

It prioritizes:

  • clarity
  • performance
  • usability

No unnecessary complexity β€” just useful output.


πŸ“š Table of Contents


βš™οΈ Installation

Option 1: Install via pip (recommended)

pip install packet-auditor

Option 2: Clone and run manually

git clone https://github.com/foxhackerzdevs/packet-auditor.git
cd packet-auditor
pip install .

⚠️ Root/Admin privileges are required for packet sniffing.


πŸš€ Usage

After pip install (CLI command)

sudo packet-audit

Windows

Run PowerShell or CMD as Administrator:

packet-audit

Options

Option Description
-i, --iface Network interface to sniff on (default: system default interface)
-f, --filter BPF filter string (e.g., "tcp port 443")
-o, --output Save output to a log file
-q, --quiet Disable terminal packet output
-l, --list-interfaces List available interfaces and exit
--version Display tool version

✨ Features

  • πŸ“¦ Real-time packet monitoring
  • 🌐 IPv4 and IPv6 support
  • πŸ” TCP, UDP, ICMP detection
  • 🧠 TCP flag inspection
  • ⚑ Lightweight (store=0, no memory buildup)
  • 🎯 BPF filtering support
  • πŸ“ Optional logging to file
  • 🀫 Quiet mode for background operation
  • πŸ–₯️ Clean, aligned terminal output
  • πŸͺŸ Windows + Npcap support

πŸ“¦ Dependencies

Defined in pyproject.toml:

  • scapy >= 2.5.0

πŸ”§ Configuration

No configuration file required. Everything is controlled via CLI arguments.


πŸ“Š Output Format

[HH:MM:SS] #COUNT SOURCE_IP -> DESTINATION_IP | PROTOCOL INFO | SIZE bytes

Example

[22:39:44] #42     10.247.195.51 -> 20.189.173.2 | TCP 55679->443 [PA] | 498 bytes

πŸ§ͺ Examples

# Monitor all traffic
sudo packet-audit

# Specific interface
sudo packet-audit -i eth0

# Filtered traffic
sudo packet-audit -f "tcp port 80"

# Log to file
sudo packet-audit -o packets.log

# Quiet background logging
sudo packet-audit -q -o packets.log

# Combined usage
sudo packet-audit -i wlan0 -f "host 8.8.8.8" -o log.txt

# List interfaces
packet-audit -l

πŸ› οΈ Troubleshooting

❌ Permission Denied

Linux/macOS:

sudo packet-audit

Windows:

  • Run PowerShell or CMD as Administrator

❌ Interface Not Found

packet-audit -l

❌ No Packets Captured

Possible causes:

  • Wrong interface
  • Overly strict filter
  • No active network traffic

❌ Android / Termux Not Supported

Packet sniffing is not supported on Android due to OS limitations in Scapy.

Use Linux, macOS, or Windows instead.


❌ Windows Capture Issues

Install Npcap:

During installation, enable:

  • Install Npcap in WinPcap API-compatible Mode

πŸ‘₯ Contributors


πŸ“„ License

This project is licensed under the MIT License.


πŸ’‘ Notes

  • Designed for learning, debugging, and lightweight monitoring
  • Not a full intrusion detection system
  • Use only on networks you own or are authorized to monitor

🧠 Philosophy

If a tool needs a long manual, it’s already too complex.

About

A lightweight command-line network packet auditing tool built with Python and Scapy. It captures live network traffic and displays concise, human-readable metadata in real time.

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages