pcapfex Logo

pcapfex

0
Free
Updated 11 March 2025
Visit Website

Packet CAPture Forensic Evidence eXtractor (pcapfex) is a tool developed by Viktor Winkelmann as part of a bachelor thesis, designed to find and extract files from packet capture files. The tool's ease of use allows users to provide a pcap-file and receive a structured export of all files found in it, even if non-standard protocols were used. pcapfex offers a plugin-system for Python developers to easily add more file-types, encodings, or complex protocols. It is developed and tested for Linux environments, depends on Python 2.7 and the dpkt package, and optionally benefits from the regex package for better performance in multithreaded search for file objects.

FEATURES

SIMILAR TOOLS

A forensics tool for tracking USB device artifacts on Linux machines.

CyLR is a Live Response Collection tool for quickly and securely collecting forensic artifacts from hosts with NTFS file systems.

A command-line utility for extracting human-readable text from binary files.

A library to access and parse OLE 2 Compound File (OLECF) format files.

A library to access and read QEMU Copy-On-Write (QCOW) image file formats with support for zlib compression and AES-CBC encryption.

An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.

A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.

A community-sourced repository of digital forensic artifacts in YAML format.

A next-generation crawling and spidering framework for extracting data from websites

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved