This is a place for scripts and tools related to Wireshark / TShark that users may like to share, and for links to related NetworkTroubleshooting tools.

You will find additional development related tools in the Development page.


Some command line tools are shipped together with Wireshark. These tools are useful to work with capture files.

  • capinfos is a program that reads a saved capture file and returns any or all of several statistics about that file

  • dumpcap a small program whose only purpose is to capture network traffic, while retaining advanced features like capturing to multiple files (since version 0.99.0). Dumpcap is the engine under the Wireshark/tshark hood. For long-term capturing, this is the tool you want.

  • editcap edit and/or translate the format of capture files

  • mergecap merges multiple capture files into one

  • randpkt random packet generator

  • rawshark dump and analyze raw libpcap data

  • reordercap reorder input file by timestamp into output file

  • text2pcap generates a capture file from an ASCII hexdump of packets

  • tshark is the command-line equivalent of Wireshark, similar in many respects to tcpdump/WinDump but with many more features. Learn it, use it, love it.


  • dumpcap.bat A batch file front-end for dumpcap.exe. It allows you to save dumpcap.exe settings, be notified of capture events or trigger dumpcap.exe capturing after a capture event occurs. It also provides hooks for performing custom actions through user-defined batch files, among other things. In order to get the most out of this batch file, it is recommended that you also download Handle.exe as well as mailsend1.17b14.exe, being sure to rename it to mailsend.exe. These executables should be saved either in a directory that is in your PATH or in the same directory as dumpcap.bat itself. (GPL, Windows)

  • maxfiles.bat A batch file to limit either the number of files in a directory to a specified limit, or the total disk space consumed by those files or both.

  • menushark, a Bourne shell menu script to allow users to employ the use of tshark by answering a few menu questions. The script also gives you the command that the menu system has made to try to teach you how to use tshark at the command line.

  • mpeg_dump, a Lua script that adds a Wireshark extension to dump MPEG-2 transport stream packets (ISO/IEC 13818-1) from a network capture to a file, for example, to extract one or more mpeg PIDs that were transported via UDP unicast or multicast.

  • osXextraction, a macOS bash script to extract particular packet types from a capture file (NOTE: it's not very macOS-specific - some small changes should allow it to work on other UN*Xes, and would probably allow it to work on Windows with Cygwin as well.)

  • : Detect IPv4 packet headers in binary dumps, Perl3, Code development, discussion

  • RtpDumpScript, a perl script to dump RTP audio data

  • RtpH263DumpScript, a perl script to dump H.263 video data

  • tektronix2pcap, a script to convert Tektronix rf5 files to pcap format that can be loaded into Wireshark. Note that current versions of Wireshark can directly read rf5 binary captures.

  • update-ws-profiles and update-ws-profiles.bat automate changing strings in a collection of Wireshark profiles, e.g. changing "gui.filter_expressions.expr: eth.addr==11:22:33:44:55:66" to "gui.filter_expressions.expr: eth.addr==66:55:44:33:22:11"

  • update_geoip.bat A batch file inspired by Jasper Bongertz's UpdateGeoIPDB.cmd file that makes it easier to update the MaxMind GeoIP database files. (GPL, Windows)


  • dumpcapui - A GUI front-end for dumpcap.exe that helps you in setting up dumpcap.exe captures and allows storing and retrieving of those settings at a later time. (Windows)

  • Net::Sharktools - Use Wireshark's packet dissection engine from Perl (blog entries: 1 2).

  • Packet Dump Decode (pdd) is a simple and convenient GUI wrapper around the Wireshark tools to convert packet hexdumps into well formatted xml (viz. text2pcap and tshark). Using pdd, you just need to copy-paste the hexdump into pdd and hit the "Decode" button (GPL, Linux/Win32)

  • Packet Hexdump Decoder (phd) is a web-based utility that uses Wireshark tools to decode packet hexdumps online.

  • Sharktools - Use Wireshark's packet dissection engine from Matlab and Python (announcement).

  • - Web interface using sharkd as backend. Git repo

  • Termshark - Terminal user interface for tshark. Written in Go, supports Linux/macOS/FreeBSD/Windows. Git repo

External Links

Tools related to NetworkTroubleshooting and alike.

Dedicated capture tools

  • dumpcap shipped with Wireshark, already mentioned at the "Internal" section above

  • Microsoft Message Analyzer Microsoft's newest tool for capturing, displaying, and analyzing protocol messaging traffic and to trace and assess system events and other messages from Windows components

  • Microsoft Network Monitor 3.4 Microsoft's network traffic capture and protocol analysis tool, now largely supplanted by Message Analyzer, but still potentially useful especially on systems that do not meet the Message Analyzer system requirements

  • Microsoft Packet Monitor tool: Packet Monitoring is a new feature that allows you to diagnose your server by capturing and displaying network traffic through the networking stack in a log that is filtered, organized, and easy to follow and manipulate. (pktmon.exe) Non-Microsoft writeup. (update when/if Microsoft documents)

  • multicap (a packet capture tool for Linux)

  • netsniff-ng (a packet capture tool for Linux)

  • netsh trace the Windows native command-line tracing tool

  • PacketCache Capture packets in RAM (Windows only)

  • Packet Sniffer Connection oriented TCP/IP packet sniffer and protocol analyzer

  • RawCap (a raw socket sniffer for Windows)

  • snoop SunOS/Solaris capture tool

  • SPAN Port Configurator (a Cisco SPAN port configuration tool for Windows)

  • TcpDump / WinDump the classical capture tool(s)

  • UML Sniffing a patch to enable sniffing in User Mode Linux (like used in netkit)

  • Colasoft Capsa Free Network Analyzer is a network analyzer freeware for Ethernet monitoring, troubleshooting and analysis. (Windows freeware)

Monitoring/tracing tools

The following tools can process the libpcap-format files that Wireshark and TShark produce or can perform network traffic capture and analysis functions complementary to those performed by Wireshark and TShark. In brackets you will find the program license and the supported operating systems.

  • A-packets Allow read pcap file and analyze IPv4/IPv6, HTTP, Telnet, FTP, DNS, SSDP, WPA protocols, build map of network structure and nodes activity graph, sniff and analyze network traffic and other pcap data. Analyse pcap files to view HTTP headers and data, extract transferred binaries, files, office documents, pictures.

  • Arkime Arkime (formerly Moloch) is a large scale, open source, indexed packet capture (PCAP) and search tool.

  • Cap'r Mak'r generates new pcaps for various protocols

  • Chaosreader Extracts data streams from TCP connections and writes each stream to a file (GPL, Windows, various UN*Xes)

  • CloudShark Ability to view and analyze captures in a browser, annotate and tag them, and share them with a URL.

  • Cookie Cadger Helps identify information leakage from applications that utilize insecure HTTP GET requests.

  • Driftnet It is a program which listens to network traffic and picks out images from TCP streams it observes (GPL, Linux)

  • Dshell is an extensible network forensic analysis framework that enables rapid development of plugins to support the dissection of network packet captures. (MIT, Linux)

  • EtherApe A graphical network monitor (GPL, Linux only)

  • Ettercap Allows for sniffing of machines in a switched network LAN (GPL, BSD/Linux/Solaris)

  • ExtShark is web-interface to tshark. It will bring dumping to cloud.

  • Homer SIP Capture Server & Agent

  • HPD Online hex message and pcap file parser with packet visualization.

  • HUNT Allows for sniffing of machines in a switched network LAN as well as providing a very easy to use API to modify the intercepted frames before they are forwarded. Intercept and Modify. (GPL, Linux)

  • Impacket It is a collection of Python classes focused on providing access to network packets (Apache, Linux).

  • ipsumdump summarizes TCP/IP dump files into a self-describing ASCII format easily readable by humans and programs (uses the Click modular router).

  • joincap Merge multiple pcap files together, gracefully (MIT, Linux/MacOS/Windows)

  • junkie A real-time packet sniffer and analyzer (AGPLv3, Linux)

  • justsniffer is a tcp packet sniffer. (GPL, BSD/Linux/Win32)

  • Mojo Packets Mojo Packets™ is web based tool which aims to simplify trace based analysis and troubleshooting of connectivity issues observed in Wi-Fi (IEEE 802.11) environments.

  • Mu DoS converts any packet into a DoS generator

  • NetSleuth is a free network forensics and pcap file analyser. It provides offline analysis for incident response, and live "silent portscanning" functionality. (GPL, Windows)

  • netsniff-ng is a free, Linux network analyzer and networking toolkit.

  • NetworkMiner A network forensic analysis tool (GPL, Windows)

  • Ntop Network top - tool that lets you analyze network traffic statistics (GPL, FreeBSD/Linux/Unix)

  • online message parser Online single hex message parser, supports Wireless/PSTN/VoIP protocols (Freeware, Web)

  • Online PCAP to MSC chart Generator generates MSC arrow diagram charts from PCAP files.

  • p0f versatile passive OS fingerprinting and many other tricks (Freeware, BSD/Linux/Win32/…). Take a lookhere to see some stats generated with p0f and some scripts.

  • packet-o-matic is a packet sniffer, supporting fairly general packet processing, used mainly for network forensics. (GPL, BSD/Linux/macOS/Solaris)

  • PacketShark™ A handheld hardware tap for 100% on-field capturing of Ethernet packets at wire speed; store captured data using an external storage device (SD memory card) and analyze using wireshark

  • pcap_diff compares pcap files for received, missing or altered packets.

  • pcapdatacopy Windows based application with various functions: copy TCP/UDP payload data from one or more .pcap files to a single file. merge multiple .pcap files into a single file, detect and export rtp streams from one or more files to both raw and wav format file.(Win32)

  • Prelude Another network intrusion detection system (GPL, BSD/Linux/Unix)

  • RRDtool is "a system to store and display time-series data (i.e. network bandwidth, machine-room temperature, server load average)". (GPL, various UN*Xes) Many RRDtool-based applications are listed on the RRD World page.

  • Show Traffic shows continuous summary list of TCP/UDP traffic (BSD, Win32)

  • Snort Network intrusion detection system (GPL, BSD/Linux/Unix/Win32)

  • SplitCap A pcap file splitter.

  • Suricata a free and open source, mature, fast and robust network threat detection engine. (GPLv2, Windows, various Un*Xes)

  • tcpflow Extracts data streams from TCP connections and writes each stream to a file (GPL, UN*X/Windows)

  • tcpick tcpick is a textmode sniffer libpcap-based that can track, reassemble and reorder tcp streams (GPL, BSD/Linux/Unix)

  • TcpShark is a packet analyzer specializing in TCP analysis, front-end for TShark. (GPL, Linux/Solaris/macOS/Windows)

  • tcpstat Tool for reporting statistics for TCP connections (BSD style, BSD/Linux/Unix)

  • tcptrace Tool for analysis of TCP connections (GPL, BSD/Linux/Unix)

  • TcpView maps TCP/UDP endpoints to running programs (Freeware, Win32)

  • tcpxtract It is a tool for extracting files from network traffic based on file signatures (GPL, various UN*Xes)

  • Tele Traffic Tapper Graphical traffic-monitoring tool; can also read saved capture files (BSD style?, BSD/Linux)

  • TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the destination (GPLv2, any OS with Python and pcapy)

  • tracesplit will split a trace into a number of smaller tracefiles (GPLv3)

  • Tranalyzer It is a lightweight flow generator and packet analyzer application (GPL, Linux)

  • TrimPCAP Trim PCAP files

  • Tstat A passive sniffer able to provide several insights on the traffic patterns at both the the network and transport levels (GPL, various UN*Xes)

  • VisualEther Protocol Analyzer generates sequence diagrams from Wireshark PDML output (Win32)

  • VoIP Analyzer Tool Merge, Split, Audit or Anonymize Wireshark VoIP captures. (Windows/Linux/macOS)

  • WebScarab WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols.

  • Xplico A network forensic analysis tool (GPL, Linux only)

  • xtractr collaborative cloud app for indexing, searching, reporting and extracting on large pcaps using tshark

  • Expert Network Analysis An online tool where you can upload a pcap traffic trace captured in the network point considered as problematic and receive a personalized report

  • Zeek (formerly Bro) an open source network security monitoring tool (BSD license, Linux, FreeBSD, macOS, possibly other various UN*Xes)

Traffic generators

These tools will either generate traffic and transmit it, retransmit traffic from a capture file, perhaps with changes, or permit you to edit traffic in a capture file and retransmit it.

  • Bit-Twist includes bittwist, to retransmit traffic from a capture file, and bittwiste, to edit a capture file and write the result to another file (GPL, BSD/Linux/OSX/Windows)

  • Cat Karat - Easy packet generation tool that allows to build custom packets for firewall or target testing and has integrated scripting ability for automated testing. (Windows)

  • D-ITG - (Distributed Internet Traffic Generator) is a platform capable to produce traffic at packet level accurately replicating appropriate stochastic processes for both IDT (Inter Departure Time) and PS (Packet Size) random variables (exponential, uniform, cauchy, normal, pareto, …).

  • epb - ethernet package bombardier Simple CLI tool for generating/converting ethernet packets from plain text/pcap/netmon/snoop files. (BSD like, Linux/Unix)

  • HexInject is a very versatile packet injector and sniffer, that provides a command-line framework for raw network access. (BSD License (2011), *nix)

  • Mausezahn Mausezahn is a free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.

  • Nemesis is a command-line network packet crafting and injection utility. Nemesis can natively craft and inject ARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF, RIP, TCP and UDP packets. (GPL, BSD/Linux/Solaris/Mac OSX/Win32)

  • Network Expect is a framework that allows to easily build tools that can interact with network traffic. Following a script, traffic can be injected into the network, and decisions can be taken, and acted upon, based on received network traffic. An interpreted language provides branching and high-level control structures to direct the interaction with the network. Network Expect uses libwireshark for all packet dissection tasks. (GPL, BSD/Linux/OSX)

  • Network Traffic Generator Client/Server based TCP/UDP traffic generator (GPL, BSD/Linux/Win32)

  • Ostinato is a network packet and traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. It features custom packet crafting with editing of any field for several protocols: Ethernet, 802.3, LLC SNAP, VLAN (with Q-in-Q), ARP, IPv4, IPv6, IP-in-IP a.k.a IP Tunneling, TCP, UDP, ICMP, IGMP, MLD, HTTP, SIP, RTSP, NNTP, etc. It is useful for both functional and performance testing. (GPL, Linux/BSD/OSX/Win32)

  • packETH GUI/CLI Ethernet packet generator (GPL, Linux/OSX/Windows)

  • Packet Sender is an open source utility to allow sending and receiving TCP, UDP, and SSL (encrypted TCP) packets (GPL, Linux/OSX/Windows).

  • PlayCap is a GUI tool for playing back pcap/Wireshark captures (GPL, Linux/Windows).

  • Scapy Scapy is a powerful interactive packet manipulation program (in Python). It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. (GPL, BSD/Linux/OSX)

  • tcpreplay the opposite of tcpdump, send pcap files out of an interface (BSD, BSD/Linux/Unix)

  • Colasoft Packet Player is a packet replayer which allows users to open captured packet trace files and play them back in the network. (Windows, see EULA)

This is another collection of traffic generators:

Capture file editors and/or anonymizers

These tools can be used to "anonymize" capture files, replacing fields such as IP addresses with randomized values.

There's a categorized list of anonymization tools at the CAIDA site.

Capture file repair

These tools attempt to repair damaged capture files as much as can be done.

  • pcapfix can repair corrupted or truncated capture files.

Capture file tools

  • bpfexam This tool illustrates the theory of Berkeley Packet Filter compilation and the practice of its reference implementation in libpcap. It can be used for troubleshooting and debugging as well.

  • Brim A new way to browse, store and archive your logs (Windows, macOS, Linux, BSD 3-Clause License)

  • Brute Shark a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files). (Windows, Linux, GPLv3)

  • large-pcap-analyzer is designed to perform some common operations on very large PCAP files at high speed.

  • sctpunbunlde splits SCTP chunks into separate frames. Git repo

Capture file conversion

These tools convert between different capture file formats.

  • etl2pcapng This tool enables you to view ndiscap packet captures with Wireshark by converting the etl file to a pcapng file. (Windows, MIT License)

  • Free online service that converts pcapng files to plain libpcap (pcap) format.

  • ProConvert convert capture files between different formats - some that Wireshark currently doesn't support (closed source freeware, unsupported and noted as buggy by vendor, registration and WildPackets maintenance contract required, Win32 only)


  • A list of tools Web page of links to various networking tools

  • dsniff is a collection of tools for network auditing and penetration testing (BSD style?, BSD/Linux/Solaris/…)

  • Network Security Toolkit (NST 36-13232) Fedora-based (F36) bootable Linux distribution with best-of-breed open source network security tools. Provides a Web-Based frontend to the dumpcap network packet capture engine with dump file format: pcapng support. Simultaneous network packet capture on up to 4 network interfaces per Multi-Tap session is supported. Also provides IPv4 Address conversation geolocations and extensive HTML report generation from PDML and PSML packet decoding. See the article: Multi-Tap Network Packet Capturing for a tutorial and example usage. Capture starting can be delayed by a duration or an absolute date. Captures can be uploaded from NST to "" or a "CloudShark Appliance" for viewing, sharing and analysis in a web browser (See: HowTo Use The NST CloudShark Upload Manager for additional information). Tshark specific statistics conversations can be generated in tabular format and then further analyzed with the NST WUI "Network Tools Widgets".

  • Packetfactory projects Various networking-related tools and libraries

  • Top 75 Security Tools from nmap users votes

USB capture

Currently, raw USB traffic can be captured with Wireshark only under Linux, macOS, and Windows; see CaptureSetup/USB. If it's an Ethernet (or any other network related) USB adapter, Wireshark can capture e.g. Ethernet traffic from that USB device if the platform supports it (which it usually will do). On Win32 you can however try:

  • SniffUSB "minor" updates and port of usbsnoop 1.8 (v2.0.0006 Feb 2007)

  • SnoopyPro based on usbsnoopy, last updated (v0.22) in 2002 (GPL, Win32)

    • Also usbsnoop seems to be by the same developer, but updated through 2001-2003 (latest v1.8)
  • usbsnoopy last updated (v0.13) in 2001 (no license, source incl., Win32)

Intrusion Analysis / SQL Database Support

  • C5 SIGMA from Command Five Pty Ltd automates TShark (Wireshark) to load large quantities of packet capture data into a SQL database using an automatically generated schema. C5 SIGMA flattens the Wireshark protocol tree into a relational table structure useful for intrusion analysis and data correlation with other systems. It also enables SQL queries against otherwise unnamed text fields visible in the Wireshark protocol tree by intelligently generating human readable names. C5 SIGMA is free software, released under GPL.

  • pcap2xml/sqlite This tool converts 802.11 packet traces (PCAP format) into an XML and SQLITE equivalent so you can now run XPATH/XQUERY/SQL queries on the packets.

Imported from on 2020-08-11 23:26:45 UTC