Philosophy: Simple β’ Practical β’ Reliable
A lightweight command-line network packet auditing tool built with Python and Scapy. It captures live network traffic and displays concise, human-readable metadata in real time.
Bare-Bones Packet Auditor is designed for developers, students, and security enthusiasts who need a minimal yet effective way to observe network traffic.
It prioritizes:
- clarity
- performance
- usability
No unnecessary complexity β just useful output.
- Introduction
- Installation
- Usage
- Features
- Dependencies
- Configuration
- Output Format
- Examples
- Troubleshooting
- Contributors
- License
pip install packet-auditorgit clone https://github.com/foxhackerzdevs/packet-auditor.git
cd packet-auditor
pip install .
β οΈ Root/Admin privileges are required for packet sniffing.
sudo packet-auditRun PowerShell or CMD as Administrator:
packet-audit| Option | Description |
|---|---|
-i, --iface |
Network interface to sniff on (default: system default interface) |
-f, --filter |
BPF filter string (e.g., "tcp port 443") |
-o, --output |
Save output to a log file |
-q, --quiet |
Disable terminal packet output |
-l, --list-interfaces |
List available interfaces and exit |
--version |
Display tool version |
- π¦ Real-time packet monitoring
- π IPv4 and IPv6 support
- π TCP, UDP, ICMP detection
- π§ TCP flag inspection
- β‘ Lightweight (
store=0, no memory buildup) - π― BPF filtering support
- π Optional logging to file
- π€« Quiet mode for background operation
- π₯οΈ Clean, aligned terminal output
- πͺ Windows + Npcap support
Defined in pyproject.toml:
scapy >= 2.5.0
No configuration file required. Everything is controlled via CLI arguments.
[HH:MM:SS] #COUNT SOURCE_IP -> DESTINATION_IP | PROTOCOL INFO | SIZE bytes
[22:39:44] #42 10.247.195.51 -> 20.189.173.2 | TCP 55679->443 [PA] | 498 bytes
# Monitor all traffic
sudo packet-audit
# Specific interface
sudo packet-audit -i eth0
# Filtered traffic
sudo packet-audit -f "tcp port 80"
# Log to file
sudo packet-audit -o packets.log
# Quiet background logging
sudo packet-audit -q -o packets.log
# Combined usage
sudo packet-audit -i wlan0 -f "host 8.8.8.8" -o log.txt
# List interfaces
packet-audit -lLinux/macOS:
sudo packet-auditWindows:
- Run PowerShell or CMD as Administrator
packet-audit -lPossible causes:
- Wrong interface
- Overly strict filter
- No active network traffic
Packet sniffing is not supported on Android due to OS limitations in Scapy.
Use Linux, macOS, or Windows instead.
Install Npcap:
During installation, enable:
- Install Npcap in WinPcap API-compatible Mode
- Abhrankan Chakrabarti (@Abhrankan-Chakrabarti)
- Maintained via foxhackerzdevs
This project is licensed under the MIT License.
- Designed for learning, debugging, and lightweight monitoring
- Not a full intrusion detection system
- Use only on networks you own or are authorized to monitor
If a tool needs a long manual, itβs already too complex.