PacketDuck is a modern, client-side Network Packet Analyzer and Threat Intelligence Dashboard. It parses PCAP files directly in the browser and leverages Google Gemini AI to provide forensic insights, risk scoring, and threat detection.
- Client-Side Processing: Parses
.pcapfiles entirely in the browser. Your raw packet data stays on your machine until you explicitly choose to analyze threats. - AI-Powered Threat Intel: Uses Google's Gemini model to analyze traffic patterns, payload anomalies, and generate an executive security assessment. ![]
- Interactive Timeline:
- Attack Detection: Heuristics for SQL Injection, XSS, RCE, and Shellcode.
- Behavioral Analysis: Detects Traffic Bursts, Port Scans, and Lateral Movement (Pivoting).
- Context Linking: Visually links related events (e.g., a burst followed by a new connection).
- Visualizations:
- Forensic Tools:
- Frontend: React 19, TypeScript, Vite
- Styling: Tailwind CSS
- AI: Google GenAI SDK (Gemini 1.5 Flash)
- Visualization: Recharts, Lucide React
- Utilities: jsPDF, html2canvas
-
Clone the repository
git clone https://github.com/yourusername/packetduck.git cd packetduck -
Install dependencies
npm install
-
Configure Environment Variables Create a
.envfile in the root directory:# Required for AI Analysis GEMINI_API_KEY=your_google_gemini_api_key # Optional: For IP Reputation checks (Free tier works) VT_API_KEY=your_virustotal_api_key
-
Run the development server
npm run dev
- Google Gemini API: Get your key from Google AI Studio.
- VirusTotal API: Sign up at VirusTotal to get a free public API key.
PacketDuck performs the heavy lifting (PCAP parsing) locally.
- Local Parsing: The raw binary parsing happens in your browser's memory.
- AI Analysis: When you trigger the AI analysis, a subset of metadata (summarized logs, top protocols, and specific payload snippets) is sent to the Google Gemini API for processing.
MIT





