Invisible network protocol sniffer
-
Updated
May 30, 2024 - Python
Invisible network protocol sniffer
Python-based Comprehensive Network Packet Analysis Library
Network Packet Tracer Library
Analyzed a Wireshark/TCPdump trace to characterize the TCP flows in the trace and also figured out the HTTP Versions, congestion window sizes and packet losses
Code for RnD project at IIT Bombay. This work was published at IEEE ICNP 2018 workshop P4EU.
heiFIP: A tool to convert network traffic into images for ML use cases
A simple parser written in python to quickly get ports and connections related to a specific HOST from a PCAP file
Modified version of USTC-TK2016: Toolkit for processing PCAP file and transform into image data for training
This class allows to efficiently convert bigger than memory pcap files to a labeled feature-per-byte dataset in parquet format
Multicast Sequence Decoder
A Man on the Side network attack tool written in Python 👾 ⚔ 💻 (2019)
Analysis and Visualization of network traffic from data centres based on trace.pcap file.
pcap browser and viewer for .pcap files
Allows for extracting information from PCAP files, as well as detecting malicious traffic
Simple .pcap format file parser
Pcap-analyzer to automate the process of finding malicious domains that interracted with a specific IP-Victim
Add a description, image, and links to the pcap-parser topic page so that developers can more easily learn about it.
To associate your repository with the pcap-parser topic, visit your repo's landing page and select "manage topics."