The Wayback Machine - https://web.archive.org/web/20220603112824/https://github.com/topics/pcap
Skip to content
#

pcap

Here are 492 public repositories matching this topic...

gpotter2
gpotter2 commented Dec 18, 2016

Hi & welcome to Scapy's github ! This page lists issues that you can try to fix if you want to start contributing to Scapy.

This list includes wishes and things added by the maintainers based on the issues that we get, but also issues marked with TODO or XXX that already exist in Scapy's code base (layers). If you want to contribute to the project you might just take care one of the bugs.

timwoj
timwoj commented May 31, 2022

We currently have coverage for raw packets, pop3, and dns (in a fashion). It would be good to expand our coverage to other major protocols. I'm currently thinking at least the following:

  • DNS again (using the buffer splitter code in the pop3 fuzzer)
  • HTTP
  • ICMP
  • SMTP

On top of that, we should take a look at the coverage statistics we're getting from oss-fuzz and determine where the ga

good first issue Complexity: Modest Area: Protocol Analysis Type: Project
BruteShark

PcapPlusPlus is a multiplatform C++ library for capturing, parsing and crafting of network packets. It is designed to be efficient, powerful and easy to use. It provides C++ wrappers for the most popular packet processing engines such as libpcap, WinPcap, DPDK and PF_RING.
  • Updated Jun 3, 2022
  • C++

Portable (that doesn't include proprietary/commercial operating systems) solution for conversion of cap/pcap/pcapng (gz compressed) WiFi dump files to hashcat formats (recommended by hashcat) and to John the Ripper formats. hcx: h = hash, c = convert and calculate candidates, x = different hashtypes
  • Updated Jun 3, 2022
  • C
riramar
riramar commented Feb 15, 2019

I'm trying a simple test with tcpliveplay but it seems tcpliveplay doesn't handle TCP handshake properly.
Let me describe the steps from my testing.

  1. Logged as root on machine A I ran this command to capture all the traffic to the host 104.31.95.22 (my website).

# tcpdump host 104.31.95.22 -n -s 65535 -w http.pcap

  1. In another shell instance under the same machine I performed a
good first issue shelved

Improve this page

Add a description, image, and links to the pcap topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the pcap topic, visit your repo's landing page and select "manage topics."

Learn more