TrafficAnalyzer is a powerful network traffic analysis tool that allows you to capture, analyze, and monitor network packets. It provides a user-friendly interface and a range of features for examining network traffic, detecting security threats, and generating statistical reports.
- Capture network packets and display detailed information about each packet, - including source/destination IP addresses, ports, protocols, timestamps, packet size, and raw data.
 - Save captured packets to a PCAP file for later analysis or sharing with others.
 - Live monitoring mode for real-time packet capturing and analysis.
 - Apply filters to capture specific types of packets based on protocols, IP addresses, ports, packet sizes, and more.
 - Visualize captured packet statistics using charts and graphs. (Beta)
 - Detect common security threats such as SQL injection, XSS (Cross-Site Scripting) attacks, and OS command injection.
 - Maintain a list of active connections, including their source/destination IP addresses, ports, protocols, and timestamps.
 - Make system more secure with firewall (Beta)
 
- 
Clone the repository:
git clone https://github.com/HalilDeniz/TrafficAnalyzer.git
 - 
Install the required dependencies:
pip install -r requirements.txt
 
python trafficanalyzer.py [-h] [-i INTERFACE] [-f FILTER] [-c COUNT] [-sv] [-lm] [-tip TARGET_IP]
                           [-pr PROTOCOLS [PROTOCOLS ...]] [-tp TARGET_PORT] [--min MIN_PACKET_SIZE]
                           [--max MAX_PACKET_SIZE]-h,--help: Show the help message and usage instructions.-i INTERFACE,--interface INTERFACE: Specify the network interface to capture traffic (e.g., eth0, wlan0).-f FILTER,--filter FILTER: Set the filter expression for capturing packets (default: "tcp").-c COUNT,--count COUNT: Set the number of packets to capture (default: 10).-sv,--save-packets: Save captured packets to a PCAP file.-lm,--live-monitor: Enable live monitoring mode for real-time packet capturing and analysis.-tip TARGET_IP,--target-ip TARGET_IP: Set the destination IP address to capture packets.-pr PROTOCOLS [PROTOCOLS ...],--protocols PROTOCOLS [PROTOCOLS ...]: Specify a list of protocols to filter packets.-tp TARGET_PORT,--target-port TARGET_PORT: Set the target port to capture packets.--min MIN_PACKET_SIZE: Set the minimum packet size for capturing.--max MAX_PACKET_SIZE: Set the maximum packet size for capturing.
- Capture and analyze 100 TCP packets on the default network interface:
 
Tabii, işte boşaltılmış kullanım örnekleri:
- 
Capture and analyze packets on the default network interface:
python trafficanalyzer.py
 - 
Capture and save packets to a PCAP file:
python trafficanalyzer.py -sv
 - 
Capture packets with a specific filter expression:
python trafficanalyzer.py -f "tcp and port 80" - 
Capture packets to and from a specific IP address:
python trafficanalyzer.py -tip 192.168.0.100
 - 
Capture packets with specific protocols:
python trafficanalyzer.py -pr tcp udp
 - 
Capture packets with a specific target port:
python trafficanalyzer.py -tp 8080
 - 
Capture packets with a specific minimum packet size:
python trafficanalyzer.py --min 100
 - 
Capture packets with a specific maximum packet size:
python trafficanalyzer.py --max 1500
- Capture packets with a specific maximum and minimum packet size:
 
python trafficanalyzer.py --min 150 --max 1500
 
If you have any questions, comments, or suggestions about Tool Name, please feel free to contact me:
- LinkedIn: https://www.linkedin.com/in/halil-ibrahim-deniz/
 - TryHackMe: https://tryhackme.com/p/halilovic
 - Instagram: https://www.instagram.com/deniz.halil333/
 - YouTube: https://www.youtube.com/c/HalilDeniz
 - Email: [email protected]
 
This project is licensed under the MIT License. See the LICENSE file for more details.