<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>packet-capture</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/520/feed"/>
    <updated>2026-05-14T08:18:34+00:00</updated>
    <id>https://links.biapy.com/guest/tags/520/feed</id>
            <entry>
            <id>https://links.biapy.com/links/12446</id>
            <title type="text"><![CDATA[NetWatch]]></title>
            <link rel="alternate" href="https://github.com/matthart1983/netwatch" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/12446"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Real-time network diagnostics in your terminal. One command, zero config, instant visibility. 

 Launch → see every interface, connection, and health probe instantly. Arm the flight recorder before an incident disappears.]]>
            </summary>
            <updated>2026-04-07T07:35:51+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10220</id>
            <title type="text"><![CDATA[RustNet]]></title>
            <link rel="alternate" href="https://github.com/domcyrus/rustnet" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10220"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A cross-platform network monitoring terminal UI tool built with Rust.

RustNet provides real-time visibility into network connections with detailed state information, connection lifecycle management, deep packet inspection, and a terminal user interface.

Related contents:

- [Episode 631: Offline By Default @ Linux Unplugged](https://linuxunplugged.com/631).]]>
            </summary>
            <updated>2025-09-17T07:57:53+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/348</id>
            <title type="text"><![CDATA[Sonar]]></title>
            <link rel="alternate" href="https://sonar-team.github.io/doc/en/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/348"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Optimized Node Monitoring for Network Analysis.

SONAR is designed to simplify network configuration audits in critical environments.
With a clean interface and a robust architecture, it enables any personnel — even non-technical — to understand and document network flows independently.

- [Sonar Desktop App @ GitHub](https://github.com/Sonar-team/Sonar_desktop_app).]]>
            </summary>
            <updated>2026-01-23T15:17:41+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/527</id>
            <title type="text"><![CDATA[oryx]]></title>
            <link rel="alternate" href="https://github.com/pythops/oryx" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/527"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[🕵️‍♂️ TUI for sniffing network traffic using eBPF on Linux]]>
            </summary>
            <updated>2025-08-28T17:26:01+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1451</id>
            <title type="text"><![CDATA[Subtrace]]></title>
            <link rel="alternate" href="https://subtrace.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1451"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Wireshark forDocker containers.
See all incoming and outgoing requests in Docker containers with just one command.

Subtrace is Wireshark for your Docker containers. It lets developers see all incoming and outgoing requests in their backend server so that they can resolve production issues faster.

- [Subtrace @ GitHub](https://github.com/subtrace/subtrace).]]>
            </summary>
            <updated>2025-08-28T19:59:17+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1891</id>
            <title type="text"><![CDATA[BruteShark]]></title>
            <link rel="alternate" href="https://github.com/odedshimon/BruteShark" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1891"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Network Analysis Tool.

BruteShark is a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files, but it also capable of directly live capturing from a network interface). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to perform an offline Brute Force attack.]]>
            </summary>
            <updated>2025-08-28T21:12:05+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2024</id>
            <title type="text"><![CDATA[📊 A-Packets]]></title>
            <link rel="alternate" href="https://apackets.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2024"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Online PCAP Analysis and Network Traffic Insights.

Effortless PCAP File Analysis in Your Browser

Explore and analyze PCAP files online using A-Packets, designed to provide comprehensive insights into network protocols like IPv4/IPv6, HTTP, Telnet, FTP, DNS, SSDP, and WPA2. This tool allows users to easily view details of network communications and dissect layers of data transmission.]]>
            </summary>
            <updated>2025-08-28T21:33:16+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2636</id>
            <title type="text"><![CDATA[Kyanos]]></title>
            <link rel="alternate" href="https://kyanos.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2636"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Simple &amp;amp; Powerful Network Tracing Tool.

Visualize the time packets spend in the kernel, watch &amp;amp; analyze in command line.
Capture http/redis/mysql requests/responses in command line.

- [Kyanos @ GitHub](https://github.com/hengyoush/kyanos).]]>
            </summary>
            <updated>2025-08-28T23:17:08+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3045</id>
            <title type="text"><![CDATA[Arkime]]></title>
            <link rel="alternate" href="https://arkime.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3045"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Network Analysis &amp;amp; Packet Capture. It&amp;#039;s amazing what you discover when you start looking. 

Arkime is an open source, large scale, full packet capturing, indexing, and database system. 

- [Arkime @ GitHub](https://github.com/arkime/arkime).]]>
            </summary>
            <updated>2025-08-29T00:24:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3059</id>
            <title type="text"><![CDATA[Sniffnet]]></title>
            <link rel="alternate" href="https://sniffnet.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3059"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[comfortably monitor your Internet traffic 🕵️‍♂️.
 &amp;quot;If you&amp;#039;re looking for a quick and easy way to monitor your network traffic, this cross-platform app written in Rust definitely passes the Sniff Test&amp;quot;

Sniffnet is a network monitoring tool to help you easily keep track of your Internet traffic.

Whether you want to gather statistics, or you need to inspect more in depth what&amp;#039;s going on in your network, this app will get you covered. 

- [Sniffnet @ GitHub](https://github.com/GyulyVGC/sniffnet).]]>
            </summary>
            <updated>2025-08-29T00:26:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3389</id>
            <title type="text"><![CDATA[WhoYouCalling]]></title>
            <link rel="alternate" href="https://github.com/H4NM/WhoYouCalling" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3389"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Records an executable&amp;#039;s network activity into a Full Packet Capture file (.pcap) and much more. 

Monitors network activity made by a process through the use of Windows Event Tracing (ETW) and Full Packet Capture (FPC). Filters a generated .pcap file with BPF based on the detected network activity made by the process. This application makes process network monitoring hella&amp;#039; easy.]]>
            </summary>
            <updated>2025-08-29T01:21:04+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3542</id>
            <title type="text"><![CDATA[eCapture]]></title>
            <link rel="alternate" href="https://ecapture.cc/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3542"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64. 

- [eCapture @ GitHub](https://github.com/gojue/ecapture).
- [115 - RADIUS/UDP Considered Harmful @ Feisty Duck&amp;#039;s Cryptography &amp;amp; Security Newsletter](https://www.feistyduck.com/newsletter/issue_115_radius_udp_considered_harmful).]]>
            </summary>
            <updated>2025-08-29T01:47:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4466</id>
            <title type="text"><![CDATA[netscanner]]></title>
            <link rel="alternate" href="https://github.com/Chleba/netscanner" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4466"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Network scanning tool with features like:

- List Interfaces
- WiFi scanning
- WiFi signal strength (with chart)
- Ping CIDR with hostname, oui &amp;amp; mac address
- packetdump (TCP, UDP, ICMP, ARP)

must be run with sudo priviliges]]>
            </summary>
            <updated>2025-08-29T04:22:32+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5058</id>
            <title type="text"><![CDATA[pmacct]]></title>
            <link rel="alternate" href="http://www.pmacct.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5058"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[IP accounting iconoclasm.

pmacct is a small set of multi-purpose passive network monitoring tools. It can account, classify, aggregate, replicate and export forwarding-plane data, ie. IPv4 and IPv6 traffic; collect and correlate control-plane data via BGP and BMP; collect and correlate RPKI data; collect infrastructure data via Streaming Telemetry. Each component works both as a standalone daemon and as a thread of execution for correlation purposes (ie. enrich NetFlow with BGP data).

[pmacct @ GitHub](https://github.com/pmacct/pmacct)]]>
            </summary>
            <updated>2025-08-29T06:00:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5790</id>
            <title type="text"><![CDATA[TraceWrangler - Packet Capture Toolkit]]></title>
            <link rel="alternate" href="https://www.tracewrangler.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5790"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[TraceWrangler is a network capture file toolkit running on Windows (or on Linux, using WINE) that supports PCAP as well as the new PCAPng file format, which is now the standard file format used by Wireshark. The most prominent use case for TraceWrangler is the easy sanitization and anonymization of PCAP and PCAPng files (sometimes called &amp;quot;trace files&amp;quot;, &amp;quot;capture files&amp;quot; or &amp;quot;packet captures&amp;quot;), removing or replacing sensitive data while being easy to use.]]>
            </summary>
            <updated>2025-08-29T08:01:37+00:00</updated>
        </entry>
    </feed>
