This is a place for scripts and tools related to Wireshark / TShark that users may like to share, and for links to related NetworkTroubleshooting tools.
You will find additional development related tools in the Development page.
Some command line tools are shipped together with Wireshark. These tools are useful to work with capture files.
capinfos is a program that reads a saved capture file and returns any or all of several statistics about that file
dumpcap a small program whose only purpose is to capture network traffic, while retaining advanced features like capturing to multiple files (since version 0.99.0). Dumpcap is the engine under the Wireshark/tshark hood. For long-term capturing, this is the tool you want.
editcap edit and/or translate the format of capture files
mergecap merges multiple capture files into one
randpkt random packet generator
rawshark dump and analyze raw libpcap data
reordercap reorder input file by timestamp into output file
text2pcap generates a capture file from an ASCII hexdump of packets
tshark is the command-line equivalent of Wireshark, similar in many respects to tcpdump/WinDump but with many more features. Learn it, use it, love it.
dumpcap.bat A batch file front-end for dumpcap.exe. It allows you to save dumpcap.exe settings, be notified of capture events or trigger dumpcap.exe capturing after a capture event occurs. It also provides hooks for performing custom actions through user-defined batch files, among other things. In order to get the most out of this batch file, it is recommended that you also download Handle.exe as well as mailsend1.17b14.exe, being sure to rename it to mailsend.exe. These executables should be saved either in a directory that is in your PATH or in the same directory as dumpcap.bat itself. (GPL, Windows)
menushark, a Bourne shell menu script to allow users to employ the use of tshark by answering a few menu questions. The script also gives you the command that the menu system has made to try to teach you how to use tshark at the command line.
mpeg_dump, a Lua script that adds a Wireshark extension to dump MPEG-2 transport stream packets (ISO/IEC 13818-1) from a network capture to a file, for example, to extract one or more mpeg PIDs that were transported via UDP unicast or multicast.
osXextraction, a Mac OS X bash script to extract particular packet types from a capture file (NOTE: it's not very OS X-specific - some small changes should allow it to work on other UN*Xes, and would probably allow it to work on Windows with Cygwin as well.)
RtpH263DumpScript, a perl script to dump H.263 video data
update-ws-profiles and update-ws-profiles.bat automate changing strings in a collection of Wireshark profiles, e.g. changing "gui.filter_expressions.expr: eth.addr==11:22:33:44:55:66" to "gui.filter_expressions.expr: eth.addr==66:55:44:33:22:11"
dumpcapui - A GUI front-end for dumpcap.exe that helps you in setting up dumpcap.exe captures and allows storing and retrieving of those settings at a later time. (Windows)
Packet Dump Decode (pdd) is a simple and convenient GUI wrapper around the Wireshark tools to convert packet hexdumps into well formatted xml (viz. text2pcap and tshark). Using pdd, you just need to copy-paste the hexdump into pdd and hit the "Decode" button (GPL, Linux/Win32)
Packet Hexdump Decoder (phd) is a web-based utility that uses Wireshark tools to decode packet hexdumps online.
Tools related to NetworkTroubleshooting and alike.
Dedicated capture tools
dumpcap shipped with Wireshark, already mentioned at the "Internal" section above
multicap (a packet capture tool for Linux)
netsniff-ng (a packet capture tool for Linux)
RawCap (a raw socket sniffer for Windows)
snoop SunOS/Solaris capture tool
SPAN Port Configurator (a Cisco SPAN port configuration tool for Windows)
The following tools can process the libpcap-format files that Wireshark and TShark produce or can perform network traffic capture and analysis functions complementary to those performed by Wireshark and TShark. In brackets you will find the program license and the supported operating systems.
Cap'r Mak'r generates new pcaps for various protocols
Chaosreader Extracts data streams from TCP connections and writes each stream to a file (GPL, Windows, various UN*Xes)
CloudShark Ability to view and analyze captures in a browser, annotate and tag them, and share them with a URL.
Cookie Cadger Helps identify information leakage from applications that utilize insecure HTTP GET requests.
Driftnet It is a program which listens to network traffic and picks out images from TCP streams it observes (GPL, Linux)
Dshell is an extensible network forensic analysis framework that enables rapid development of plugins to support the dissection of network packet captures. (MIT, Linux)
EtherApe A graphical network monitor (GPL, Linux only)
Ettercap Allows for sniffing of machines in a switched network LAN (GPL, BSD/Linux/Solaris)
ExtShark is web-interface to tshark. It will bring dumping to cloud.
HUNT Allows for sniffing of machines in a switched network LAN as well as providing a very easy to use API to modify the intercepted frames before they are forwarded. Intercept and Modify. (GPL, Linux)
Impacket It is a collection of Python classes focused on providing access to network packets (Apache, Linux).
junkie A real-time packet sniffer and analyzer (AGPLv3, Linux)
justsniffer is a tcp packet sniffer. (GPL, BSD/Linux/Win32)
Moluch Moloch is an open source, large scale IPv4 packet capturing (PCAP), indexing and database system.
Mu DoS converts any packet into a DoS generator
NetSleuth is a free network forensics and pcap file analyser. It provides offline analysis for incident response, and live "silent portscanning" functionality. (GPL, Windows)
netsniff-ng is a free, Linux network analyzer and networking toolkit.
NetworkMiner A network forensic analysis tool (GPL, Windows)
Ntop Network top - tool that lets you analyze network traffic statistics (GPL, FreeBSD/Linux/Unix)
online message parser Online single hex message parser, supports Wireless/PSTN/VoIP protocols (Freeware, Web)
Online PCAP to MSC chart Generator generates MSC arrow diagram charts from PCAP files.
packet-o-matic is a packet sniffer, supporting fairly general packet processing, used mainly for network forensics. (GPL, BSD/Linux/Mac OS X/Solaris)
PacketShark™ A handheld hardware tap for 100% on-field capturing of Ethernet packets at wire speed; store captured data using an external storage device (SD memory card) and analyze using wireshark
pcap_diff compares pcap files for received, missing or altered packets.
Prelude Another network intrusion detection system (GPL, BSD/Linux/Unix)
RRDtool is "a system to store and display time-series data (i.e. network bandwidth, machine-room temperature, server load average)". (GPL, various UN*Xes) Many RRDtool-based applications are listed on the RRD World page.
Show Traffic shows continuous summary list of TCP/UDP traffic (BSD, Win32)
Snort Network intrusion detection system (GPL, BSD/Linux/Unix/Win32)
SplitCap A pcap file splitter.
tcpflow Extracts data streams from TCP connections and writes each stream to a file (GPL, UN*X/Windows)
tcpick tcpick is a textmode sniffer libpcap-based that can track, reassemble and reorder tcp streams (GPL, BSD/Linux/Unix)
tcpstat Tool for reporting statistics for TCP connections (BSD style, BSD/Linux/Unix)
tcptrace Tool for analysis of TCP connections (GPL, BSD/Linux/Unix)
TcpView maps TCP/UDP endpoints to running programs (Freeware, Win32)
tcpxtract It is a tool for extracting files from network traffic based on file signatures (GPL, various UN*Xes)
Tele Traffic Tapper Graphical traffic-monitoring tool; can also read saved capture files (BSD style?, BSD/Linux)
TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the destination (GPLv2, any OS with Python and pcapy)
Tranalyzer It is a lightweight flow generator and packet analyzer application (GPL, Linux)
Tstat A passive sniffer able to provide several insights on the traffic patterns at both the the network and transport levels (GPL, various UN*Xes)
VisualEther Protocol Analyzer generates sequence diagrams from Wireshark PDML output (Win32)
Xplico A network forensic analysis tool (GPL, Linux only)
xtractr collaborative cloud app for indexing, searching, reporting and extracting on large pcaps using tshark
Expert Network Analysis An online tool where you can upload a pcap traffic trace captured in the network point considered as problematic and receive a personalized report
These tools will either generate traffic and transmit it, retransmit traffic from a capture file, perhaps with changes, or permit you to edit traffic in a capture file and retransmit it.
Bit-Twist includes bittwist, to retransmit traffic from a capture file, and bittwiste, to edit a capture file and write the result to another file (GPL, BSD/Linux/OSX/Windows)
Cat Karat - Easy packet generation tool that allows to build custom packets for firewall or target testing and has integrated scripting ability for automated testing. (Windows)
D-ITG - (Distributed Internet Traffic Generator) is a platform capable to produce traffic at packet level accurately replicating appropriate stochastic processes for both IDT (Inter Departure Time) and PS (Packet Size) random variables (exponential, uniform, cauchy, normal, pareto, ...).
epb - ethernet package bombardier Simple CLI tool for generating/converting ethernet packets from plain text/pcap/netmon/snoop files. (BSD like, Linux/Unix)
Mausezahn Mausezahn is a free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.
Nemesis is a command-line network packet crafting and injection utility. Nemesis can natively craft and inject ARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF, RIP, TCP and UDP packets. (GPL, BSD/Linux/Solaris/Mac OSX/Win32)
Network Expect is a framework that allows to easily build tools that can interact with network traffic. Following a script, traffic can be injected into the network, and decisions can be taken, and acted upon, based on received network traffic. An interpreted language provides branching and high-level control structures to direct the interaction with the network. Network Expect uses libwireshark for all packet dissection tasks. (GPL, BSD/Linux/OSX)
Network Traffic Generator Client/Server based TCP/UDP traffic generator (GPL, BSD/Linux/Win32)
Ostinato is a network packet and traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. It features custom packet crafting with editing of any field for several protocols: Ethernet, 802.3, LLC SNAP, VLAN (with Q-in-Q), ARP, IPv4, IPv6, IP-in-IP a.k.a IP Tunneling, TCP, UDP, ICMP, IGMP, MLD, HTTP, SIP, RTSP, NNTP, etc. It is useful for both functional and performance testing. (GPL, Linux/BSD/OSX/Win32)
packETH GUI/CLI Ethernet packet generator (GPL, Linux/OSX/Windows)
PlayCap is a GUI tool for playing back pcap/Wireshark captures (GPL, Linux/Windows).
Scapy Scapy is a powerful interactive packet manipulation program (in Python). It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. (GPL, BSD/Linux/OSX)
tcpreplay the opposite of tcpdump, send pcap files out of an interface (BSD, BSD/Linux/Unix)
This is another collection of traffic generators: http://www.grid.unina.it/software/ITG/link.php
Capture file anonymization
These tools can be used to "anonymize" capture files, replacing fields such as IP addresses with randomized values.
The bittwiste tool from Bit-Twist.
The Crypto-PAn tool.
The pktanon tool from the Karlsruhe Institute of Technology Institute of Telematics.
The SCRUB-tcpdump tool.
The TraceWrangler tool.
Capture file repair
These tools attempt to repair damaged capture files as much as can be done.
pcapfix can repair corrupted or truncated capture files.
Capture file conversion
These tools convert between different capture file formats.
PcapNG.com Free online service that converts Pcap-NG files to plain libpcap (PCAP) format.
ProConvert convert capture files between different formats - some that Wireshark currently doesn't support (closed source freeware, unsupported and noted as buggy by vendor, registration and WildPackets maintenance contract required, Win32 only)
A list of tools Web page of links to various networking tools
dsniff is a collection of tools for network auditing and penetration testing (BSD style?, BSD/Linux/Solaris/...)
Network Security Toolkit (NST 20-6535) Fedora-based (F20) bootable Linux CD/DVD with best-of-breed open source network security tools. Provides a Web-Based frontend to the dumpcap network packet capture engine with dump file format: pcapng support. Simultaneous network packet capture on up to 4 network interfaces per Multi-Tap session is supported. Also provides IPv4 Address conversation geolocations and extensive HTML report generation from PDML and PSML packet decoding. See the article: Multi-Tap Network Packet Capturing for a tutorial and example usage. Capture starting can be delayed by a duration or an absolute date. Captures can be uploaded from NST to "CloudShark.org" or a "CloudShark Appliance" for viewing, sharing and analysis in a web browser (See: HowTo Use The NST CloudShark Upload Manager for additional information).
Packetfactory projects Various networking-related tools and libraries
Raw USB traffic can be captured with Wireshark currently only under Linux, see CaptureSetup/USB. If it's an Ethernet (or any other network related) USB adapter, Wireshark can capture e.g. Ethernet traffic from that USB device if the platform supports it (which it usually will do). On Win32 you can however try:
SniffUSB "minor" updates and port of usbsnoop 1.8 (v2.0.0006 Feb 2007)
SnoopyPro based on usbsnoopy, last updated (v0.22) in 2002 (GPL, Win32)
Also usbsnoop seems to be by the same developer, but updated through 2001-2003 (latest v1.8)
usbsnoopy last updated (v0.13) in 2001 (no license, source incl., Win32)
Intrusion Analysis / SQL Database Support
C5 SIGMA from Command Five Pty Ltd automates TShark (Wireshark) to load large quantities of packet capture data into a SQL database using an automatically generated schema. C5 SIGMA flattens the Wireshark protocol tree into a relational table structure useful for intrusion analysis and data correlation with other systems. It also enables SQL queries against otherwise unnamed text fields visible in the Wireshark protocol tree by intelligently generating human readable names. C5 SIGMA is free software, released under GPL.