I do not know what I am doing yet! But it is my research!
-
Updated
May 22, 2022 - C
I do not know what I am doing yet! But it is my research!
Analysis and Visualization of network traffic from data centres based on trace.pcap file.
A comprehensive web application for replaying network packet capture (PCAP) files using tcpreplay. Built with React frontend, Flask backend, and fully containerized with Docker.
Sniffing network traffic with Python for real-time or PCAP analysis.
AirSentinel is a Python-based cross-platform tool with a PyQt5 GUI for live Wi-Fi scanning and offline PCAP analysis. It detects network details, assigns risk levels, and exports results in JSON, Markdown, or PDF, making it valuable for cybersecurity research and testing.
PCAP-based analysis of CryptoLocker and Word-Dropper malware samples using Wireshark and REMnux. Focus on DNS, HTTP, and TLS artifacts to identify adversary behavior and exfiltration attempts.
Demonstrating a man-in-the-middle (MITM) attack using ARP spoofing on three Kali Linux VMs in VirtualBox. The attacker (Kali 1) intercepts ping traffic between two victims (Kali 2 and Kali 3) with Ettercap, captures it with Wireshark, and analyzes the PCAP to verify redirection.
A lightweight packet analyzer tool featuring a user-friendly GUI interface using Npcap and wxWidgets.
A command-line companion for in-depth network traffic analysis, enabling security insights and statistical overview from PCAP files.
IP statistics from PCAP files
A real-time network intrusion detection system with GUI built using Python, Flet, and Scapy. Features advanced threat detection including ICMP/DNS tunneling, protocol anomalies, blacklisted entities, and suspicious traffic patterns. Supports live packet capture and PCAP file analysis with interactive filtering and flow visualization.
Blue Team CTF: Recovered deleted security footage from a .pcap file using Wireshark, Python, and FFmpeg. Demonstrates real-world forensic skills in network packet analysis, MJPEG stream extraction, and flag hunting. Challenge from TryHackMe's “Security Footage” room.
GREP for PCAP files
Análisis de tráfico de red usando Wireshark y K-means en Python. Clasificación de paquetes en clusters y generación de informes automatizados.
A machine learning-based system for detecting anomalies in encrypted network traffic. Supports real-time analysis, multiple detection algorithms, and insightful visualizations.
Analyze pcap file for specified SSIDs and report PMF status
Add a description, image, and links to the pcap-analysis topic page so that developers can more easily learn about it.
To associate your repository with the pcap-analysis topic, visit your repo's landing page and select "manage topics."