A powerful, native Windows application written in C# and WPF for capturing, analyzing, and decrypting network traffic. It features a custom-built, dependency-free TLS 1.2/1.3 decryption engine capable of correlating browser keylogs to decrypt and visualize application-layer data (like HTTP/2) on the fly.
- Live Packet Capture: Intercept and visualize live traffic using WinPcap/Npcap.
- TLS 1.3 Decryption: Native
TlsDecryptionEnginethat reassembles TCP streams, parses TLS records, and uses HKDF and AES-GCM to decrypt payloads on the fly using standardSSLKEYLOGFILEformats. - Offline AI Analyst: Built-in HTTP payload summarization powered by
Microsoft.ML.OnnxRuntimeGenAI. It runs quantized LLMs (like Phi-3 or Llama-3) locally with full hardware acceleration via DirectML. - Traffic Slicing & Filtering: Supports standard BPF syntax filtering (e.g.
port 443) and bidirectional tracking. - Decrypted Payload Visualization: Built-in hex viewer and text viewer for inspecting decrypted HTTP requests and headers.
- Smart History: Persents previously used IPs and BPF filters for quick access.
The project is split into two primary components:
NetworkAnalysisApp- A robust, visually-appealing WPF UI that leveragesSharpPcapfor network listening and handles configuration and user experience.TlsDecryptionEngine- A standalone class library that implements a custom TCP stream reassembler, handshakes tracker, and TLS decryption mechanics using standard.NETcryptographic primitives.
- .NET 8.0 SDK (or later)
- WinPcap, Npcap, or Wireshark installed (for driver support)
- Google Chrome or Microsoft Edge (for generating active
SSLKEYLOGFILEkeys via the UI) - To use the AI Analyst, you must manually download an ONNX-formatted local LLM directory (like
Phi-3-mini-4k-instruct-onnx'sdirectmlint4 folder) from HuggingFace and configure its path in Settings.
- Clone the repository:
git clone https://github.com/yourusername/NetworkAnalysis.git - Open
NetworkAnalysis.slnxorNetworkAnalysisApp.sln. - Set
NetworkAnalysisAppas the startup project and run. - Go to Settings and ensure the Browser Path and Key Log Path are correctly defined.
- Click Launch Browser from the UI. This launches the browser with QUIC disabled, forcing it to use trackable TCP-based TLS and aggressively log traffic keys to the path specified in your settings.
- Observe as live
ApplicationDatais decrypted right before your eyes!
- Developed by Ian Cowley and Antigravity (Google DeepMind).
MIT License - See the LICENSE file for more details.