Sniff
Makes output from the tcpdump program easier to read and parse.

Sniff
Makes output from the tcpdump program easier to read and parse.
Sniff Description
Makes output from the tcpdump program easier to read and parse. This software is now redundant as ASCII support has since been added to tcpdump in version 3.8. Features: - Coloured console output - Directly accepts tcpdump options (including parsing from packet files) - Fully customisable output Requirements: - Linux operating system - Perl installed - tcpdump program installed - Privileges in order to run tcpdump For help, run the following command: ./sniff -h Sniff options should be placed before the double dash (--) and tcpdump options should be placed after. Examples of how to use sniff: - Capture all incoming FTP packets on eth1 without using colour: ./sniff -c -- -i eth1 tcp port 21 - Real-time logging to a CSV file: ./sniff -e" -n, -s -t0 -c > /tmp/dump.csv - Converting a tcpdump dump file into CSV format: ./sniff -e" -n, -s -t0 -c -- -r /tmp/dump.txt > /tmp/dump.csv
Sniff FAQ
Common questions about Sniff including features, pricing, alternatives, and user reviews.
Sniff is Makes output from the tcpdump program easier to read and parse.. It is a Network Security solution designed to help security teams with Linux, Network Security, Packet Capture.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox