Makes output from the tcpdump program easier to read and parse. This software is now redundant as ASCII support has since been added to tcpdump in version 3.8. Features: - Coloured console output - Directly accepts tcpdump options (including parsing from packet files) - Fully customisable output Requirements: - Linux operating system - Perl installed - tcpdump program installed - Privileges in order to run tcpdump For help, run the following command: ./sniff -h Sniff options should be placed before the double dash (--) and tcpdump options should be placed after. Examples of how to use sniff: - Capture all incoming FTP packets on eth1 without using colour: ./sniff -c -- -i eth1 tcp port 21 - Real-time logging to a CSV file: ./sniff -e" -n, -s -t0 -c > /tmp/dump.csv - Converting a tcpdump dump file into CSV format: ./sniff -e" -n, -s -t0 -c -- -r /tmp/dump.txt > /tmp/dump.csv
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
FingerprintX is a standalone utility for service discovery on open ports.
Tcpreplay is a network traffic editing and replay tool used for testing network devices and applications.
A network protocol panic button operating decentralized through UDP broadcasts and HTTP, intended for sensitive networks to prevent cold boot attacks.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
A multi-threading tool for sniffing HTTP header records with support for offline and live sniffing, TCP flow statistics, and JSON output.
A fast and flexible web fuzzer for identifying vulnerabilities in web applications
A tool for extracting common indicators of compromise from a block of text.
A powerful command-line packet analyzer and a portable C/C++ library for network traffic capture with comprehensive documentation.
A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.