A professional Network Traffic Analysis tool designed for Deep Packet Inspection (DPI). This tool automates the process of reading .pcap files to identify network anomalies, top-talking devices, and protocol distributions.
To run this analyzer effectively, the following tools and environment are required:
- Python 3.8+: Ensure you have the latest stable version of Python.
- Scapy Library: The core engine used for packet parsing and dissection.
- Windows Users: You must install Npcap (in WinPcap compatibility mode) to allow Python to interface with the network stack. Download it from npcap.com.
- Linux/macOS Users: Ensure libpcap is installed (usually pre-installed or available via
apt-get install libpcap-dev).
- Wireshark: While this script performs the analysis, Wireshark is recommended for visually verifying the contents of your
demo.pcapfiles.
- Language: Python 3
- Library: Scapy (Packet Manipulation)
- Data Handling: Collections (Counter for statistical analysis)
- Format: PCAP (Packet Capture)
git clone https://github.com/6-ft/TrafficSpy.git
cd TrafficSpy
python analyzer.pyPulkit
GitHub: @6-ft