Wireshark forDocker containers.
See all incoming and outgoing requests in Docker containers with just one command.
Subtrace is Wireshark for your Docker containers. It lets developers see all incoming and outgoing requests in their backend server so that they can resolve production issues faster.
Network Analysis Tool.
BruteShark is a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files, but it also capable of directly live capturing from a network interface). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to perform an offline Brute Force attack.
Online PCAP Analysis and Network Traffic Insights.
Effortless PCAP File Analysis in Your Browser
Explore and analyze PCAP files online using A-Packets, designed to provide comprehensive insights into network protocols like IPv4/IPv6, HTTP, Telnet, FTP, DNS, SSDP, and WPA2. This tool allows users to easily view details of network communications and dissect layers of data transmission.
A Simple & Powerful Network Tracing Tool.
Visualize the time packets spend in the kernel, watch & analyze in command line.
Capture http/redis/mysql requests/responses in command line.
Network Analysis & Packet Capture. It's amazing what you discover when you start looking.
Arkime is an open source, large scale, full packet capturing, indexing, and database system.
comfortably monitor your Internet traffic ♂️.
"If you're looking for a quick and easy way to monitor your network traffic, this cross-platform app written in Rust definitely passes the Sniff Test"
Sniffnet is a network monitoring tool to help you easily keep track of your Internet traffic.
Whether you want to gather statistics, or you need to inspect more in depth what's going on in your network, this app will get you covered.
Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.
Monitors network activity made by a process through the use of Windows Event Tracing (ETW) and Full Packet Capture (FPC). Filters a generated .pcap file with BPF based on the detected network activity made by the process. This application makes process network monitoring hella' easy.
Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.
IP accounting iconoclasm.
pmacct is a small set of multi-purpose passive network monitoring tools. It can account, classify, aggregate, replicate and export forwarding-plane data, ie. IPv4 and IPv6 traffic; collect and correlate control-plane data via BGP and BMP; collect and correlate RPKI data; collect infrastructure data via Streaming Telemetry. Each component works both as a standalone daemon and as a thread of execution for correlation purposes (ie. enrich NetFlow with BGP data).
TraceWrangler is a network capture file toolkit running on Windows (or on Linux, using WINE) that supports PCAP as well as the new PCAPng file format, which is now the standard file format used by Wireshark. The most prominent use case for TraceWrangler is the easy sanitization and anonymization of PCAP and PCAPng files (sometimes called "trace files", "capture files" or "packet captures"), removing or replacing sensitive data while being easy to use.