Simplicity is the ultimate sophistication

Font Size





Wireshark Tools


wsbadge@186x57[1]Here is a copy and paste of the page (https://wiki.wireshark.org/Tools) .I decided to copy and paste the webpage here because I use active reading and I will edit the page later deleting what I do not need and adding my comments where I consider it useful. I already highlighted the ones that can help me to solve an immediate need: post packet captures online in a CloudShark like style, for my own use and future references.

-http://www.htmlgoodies.com/beyond/css/displaying-xml-files-using-css.html   -displaying XML files using CSS
-any arbitrary set of packets can be exported as XML via “Export packet Disections and Save as PDML XML



This is a place for scripts and tools related to Wireshark / TShark that users may like to share, and for links to related NetworkTroubleshootingtools.

You will find additional development related tools in the Development page.


  1. Tools
    1. Internal
    2. Scripts
    3. Wrappers
    4. External Links
      1. Dedicated capture tools
      2. Monitoring/tracing tools
      3. Traffic generators
      4. Capture file anonymization
      5. Capture file repair
      6. Capture file conversion
      7. Collections
      8. USB capture
      9. Intrusion Analysis / SQL Database Support

Some command line tools are shipped together with Wireshark. These tools are useful to work with capture files.

  • capinfos is a program that reads a saved capture file and returns any or all of several statistics about that file
  • dumpcap a small program whose only purpose is to capture network traffic, while retaining advanced features like capturing to multiple files (since version 0.99.0). Dumpcap is the engine under the Wireshark/tshark hood. For long-term capturing, this is the tool you want.
  • editcap edit and/or translate the format of capture files
  • mergecap merges multiple capture files into one
  • randpkt random packet generator
  • rawshark dump and analyze raw libpcap data
  • reordercap reorder input file by timestamp into output file
  • text2pcap generates a capture file from an ASCII hexdump of packets
  • tshark is the command-line equivalent of Wireshark, similar in many respects to tcpdump/WinDump but with many more features. Learn it, use it, love it.
  • dumpcap.bat A batch file front-end for dumpcap.exe. It allows you to save dumpcap.exe settings, be notified of capture events or triggerdumpcap.execapturing after a capture event occurs. It also provides hooks for performing custom actions through user-defined batch files, among other things. In order to get the most out of this batch file, it is recommended that you also download Handle.exe as well asmailsend1.17b14.exe, being sure to rename it to mailsend.exe. These executables should be saved either in a directory that is in your PATHor in the same directory as dumpcap.bat itself. (GPL, Windows)
  • maxfiles.bat A batch file to limit either the number of files in a directory to a specified limit, or the total disk space consumed by those files or both.
  • menushark, a Bourne shell menu script to allow users to employ the use of tshark by answering a few menu questions. The script also gives you the command that the menu system has made to try to teach you how to use tshark at the command line.
  • mpeg_dump, a Lua script that adds a Wireshark extension to dump MPEG-2 transport stream packets (ISO/IEC 13818-1) from a network capture to a file, for example, to extract one or more mpeg PIDs that were transported via UDP unicast or multicast.
  • osXextraction, a Mac OS X bash script to extract particular packet types from a capture file (NOTE: it's not very OS X-specific - some small changes should allow it to work on other UN*Xes, and would probably allow it to work on Windows with Cygwin as well.)
  • RtpDumpScript, a perl script to dump RTP audio data
  • RtpH263DumpScript, a perl script to dump H.263 video data
  • tektronix2pcap, a script to convert Tektronix rf5 files to pcap format that can be loaded into Wireshark. Note that current versions of Wireshark can directly read rf5 binary captures.
  • update-ws-profiles and update-ws-profiles.bat automate changing strings in a collection of Wireshark profiles, e.g. changing "gui.filter_expressions.expr: eth.addr==11:22:33:44:55:66" to "gui.filter_expressions.expr: eth.addr==66:55:44:33:22:11"
  • dumpcapui - A GUI front-end for dumpcap.exe that helps you in setting up dumpcap.exe captures and allows storing and retrieving of those settings at a later time. (Windows)
  • Net::Sharktools - Use Wireshark's packet dissection engine from Perl (blog entries: 1 2).
  • Packet Dump Decode (pdd) is a simple and convenient GUI wrapper around the Wireshark tools to convert packet hexdumps into well formatted xml (viz. text2pcap and tshark). Using pdd, you just need to copy-paste the hexdump into pdd and hit the "Decode" button (GPL, Linux/Win32)
  • Packet Hexdump Decoder (phd) is a web-based utility that uses Wireshark tools to decode packet hexdumps online. Python UNIX only
  • Sharktools - Use Wireshark's packet dissection engine from Matlab and Python (announcement).
External Links

Tools related to NetworkTroubleshooting and alike.

Dedicated capture tools
  • dumpcap shipped with Wireshark, already mentioned at the "Internal" section above
  • Microsoft Message Analyzer Microsoft's newest tool for capturing, displaying, and analyzing protocol messaging traffic and to trace and assess system events and other messages from Windows components
  • Microsoft Network Monitor 3.4 Microsoft's network traffic capture and protocol analysis tool, now largely supplanted by Message Analyzer, but still potentially useful especially on systems that do not meet the Message Analyzer system requirements
  • multicap (a packet capture tool for Linux)
  • netsniff-ng (a packet capture tool for Linux)
  • netsh trace the Windows native command-line tracing tool
  • Packet Sniffer Connection oriented TCP/IP packet sniffer and protocol analyzer
  • RawCap (a raw socket sniffer for Windows)
  • snoop SunOS/Solaris capture tool
  • SPAN Port Configurator (a Cisco SPAN port configuration tool for Windows)
  • TcpDump / WinDump the classical capture tool(s)
  • UML Sniffing a patch to enable sniffing in User Mode Linux (like used in netkit)
Monitoring/tracing tools

The following tools can process the libpcap-format files that Wireshark and TShark produce or can perform network traffic capture and analysis functions complementary to those performed by Wireshark and TShark. In brackets you will find the program license and the supported operating systems.

  • Cap'r Mak'r generates new pcaps for various protocols
  • Chaosreader Extracts data streams from TCP connections and writes each stream to a file (GPL, Windows, various UN*Xes)
  • CloudShark Ability to view and analyze captures in a browser, annotate and tag them, and share them with a URL.
  • Cookie Cadger Helps identify information leakage from applications that utilize insecure HTTP GET requests.
  • Driftnet It is a program which listens to network traffic and picks out images from TCP streams it observes (GPL, Linux)
  • Dshell is an extensible network forensic analysis framework that enables rapid development of plugins to support the dissection of network packet captures. (MIT, Linux)
  • EtherApe A graphical network monitor (GPL, Linux only)
  • Ettercap Allows for sniffing of machines in a switched network LAN (GPL, BSD/Linux/Solaris)
  • ExtShark is web-interface to tshark. It will bring dumping to cloud.
  • Homer SIP Capture Server & Agent
  • HUNT Allows for sniffing of machines in a switched network LAN as well as providing a very easy to use API to modify the intercepted frames before they are forwarded. Intercept and Modify. (GPL, Linux)
  • Impacket It is a collection of Python classes focused on providing access to network packets (Apache, Linux).
  • ipsumdump summarizes TCP/IP dump files into a self-describing ASCII format easily readable by humans and programs (uses the Click modular router).
  • junkie A real-time packet sniffer and analyzer (AGPLv3, Linux)
  • justsniffer is a tcp packet sniffer. (GPL, BSD/Linux/Win32)
  • Moluch Moloch is an open source, large scale IPv4 packet capturing (PCAP), indexing and database system.
  • Mu DoS converts any packet into a DoS generator
  • NetSleuth is a free network forensics and pcap file analyser. It provides offline analysis for incident response, and live "silent portscanning" functionality. (GPL, Windows)
  • netsniff-ng is a free, Linux network analyzer and networking toolkit.
  • NetworkMiner A network forensic analysis tool (GPL, Windows)
  • Ntop Network top - tool that lets you analyze network traffic statistics (GPL, FreeBSD/Linux/Unix)
  • online message parser Online single hex message parser, supports Wireless/PSTN/VoIP protocols (Freeware, Web)
  • Online PCAP to MSC chart Generator generates MSC arrow diagram charts from PCAP files.
  • p0f versatile passive OS fingerprinting and many other tricks (Freeware, BSD/Linux/Win32/...). Take a lookhere to see some stats generated with p0f and some scripts.
  • packet-o-matic is a packet sniffer, supporting fairly general packet processing, used mainly for network forensics. (GPL, BSD/Linux/Mac OS X/Solaris)
  • PacketShark™ A handheld hardware tap for 100% on-field capturing of Ethernet packets at wire speed; store captured data using an external storage device (SD memory card) and analyze using wireshark
  • pcap_diff compares pcap files for received, missing or altered packets.
  • pcapdatacopy Windows based application with various functions: copy TCP/UDP payload data from one or more .pcap files to a single file. merge multiple .pcap files into a single file, detect and export rtp streams from one or more files to both raw and wav format file.(Win32)
  • Prelude Another network intrusion detection system (GPL, BSD/Linux/Unix)
  • RRDtool is "a system to store and display time-series data (i.e. network bandwidth, machine-room temperature, server load average)". (GPL, various UN*Xes) Many RRDtool-based applications are listed on the RRD World page.
  • Show Traffic shows continuous summary list of TCP/UDP traffic (BSD, Win32)
  • Snort Network intrusion detection system (GPL, BSD/Linux/Unix/Win32)
  • SplitCap A pcap file splitter.
  • tcpflow Extracts data streams from TCP connections and writes each stream to a file (GPL, UN*X/Windows)
  • tcpick tcpick is a textmode sniffer libpcap-based that can track, reassemble and reorder tcp streams (GPL, BSD/Linux/Unix)
  • tcpstat Tool for reporting statistics for TCP connections (BSD style, BSD/Linux/Unix)
  • tcptrace Tool for analysis of TCP connections (GPL, BSD/Linux/Unix)
  • TcpView maps TCP/UDP endpoints to running programs (Freeware, Win32)
  • tcpxtract It is a tool for extracting files from network traffic based on file signatures (GPL, various UN*Xes)
  • Tele Traffic Tapper Graphical traffic-monitoring tool; can also read saved capture files (BSD style?, BSD/Linux)
  • TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the destination (GPLv2, any OS with Python and pcapy)
  • Tranalyzer It is a lightweight flow generator and packet analyzer application (GPL, Linux)
  • TribeLab Workbench Formerly known as TraceMatcher, Workbench is a Wireshark enhancement tool that simplifies and automates many of the actions you perform each time you use Wireshark (proprietary, Windows)
  • Tstat A passive sniffer able to provide several insights on the traffic patterns at both the the network and transport levels (GPL, various UN*Xes)
  • VisualEther Protocol Analyzer generates sequence diagrams from Wireshark PDML output (Win32)
  • WebScarab WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols.
  • Xplico A network forensic analysis tool (GPL, Linux only)
  • xtractr collaborative cloud app for indexing, searching, reporting and extracting on large pcaps using tshark
  • Expert Network Analysis An online tool where you can upload a pcap traffic trace captured in the network point considered as problematic and receive a personalized report
Traffic generators

These tools will either generate traffic and transmit it, retransmit traffic from a capture file, perhaps with changes, or permit you to edit traffic in a capture file and retransmit it.

  • Bit-Twist includes bittwist, to retransmit traffic from a capture file, and bittwiste, to edit a capture file and write the result to another file (GPL, BSD/Linux/OSX/Windows)
  • Cat Karat - Easy packet generation tool that allows to build custom packets for firewall or target testing and has integrated scripting ability for automated testing. (Windows)
  • D-ITG - (Distributed Internet Traffic Generator) is a platform capable to produce traffic at packet level accurately replicating appropriate stochastic processes for both IDT (Inter Departure Time) and PS (Packet Size) random variables (exponential, uniform, cauchy, normal, pareto, ...).
  • epb - ethernet package bombardier Simple CLI tool for generating/converting ethernet packets from plain text/pcap/netmon/snoop files. (BSD like, Linux/Unix)
  • Mausezahn Mausezahn is a free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.
  • Nemesis is a command-line network packet crafting and injection utility. Nemesis can natively craft and inject ARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF, RIP, TCP and UDP packets. (GPL, BSD/Linux/Solaris/Mac OSX/Win32)
  • Network Expect is a framework that allows to easily build tools that can interact with network traffic. Following a script, traffic can be injected into the network, and decisions can be taken, and acted upon, based on received network traffic. An interpreted language provides branching and high-level control structures to direct the interaction with the network. Network Expect uses libwireshark for all packet dissection tasks. (GPL, BSD/Linux/OSX)
  • Network Traffic Generator Client/Server based TCP/UDP traffic generator (GPL, BSD/Linux/Win32)
  • Ostinato is a network packet and traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. It features custom packet crafting with editing of any field for several protocols: Ethernet, 802.3, LLC SNAP, VLAN (with Q-in-Q), ARP, IPv4, IPv6, IP-in-IP a.k.a IP Tunneling, TCP, UDP, ICMP, IGMP, MLD, HTTP, SIP, RTSP, NNTP, etc. It is useful for both functional and performance testing. (GPL, Linux/BSD/OSX/Win32)
  • packETH GUI/CLI Ethernet packet generator (GPL, Linux/OSX/Windows)
  • PlayCap is a GUI tool for playing back pcap/Wireshark captures (GPL, Linux/Windows).
  • Scapy Scapy is a powerful interactive packet manipulation program (in Python). It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. (GPL, BSD/Linux/OSX)
  • tcpreplay the opposite of tcpdump, send pcap files out of an interface (BSD, BSD/Linux/Unix)

This is another collection of traffic generators: http://www.grid.unina.it/software/ITG/link.php

Capture file anonymization

These tools can be used to "anonymize" capture files, replacing fields such as IP addresses with randomized values.

There's a categorized list of anonymization tools at the CAIDA site.

Capture file repair

These tools attempt to repair damaged capture files as much as can be done.

  • pcapfix can repair corrupted or truncated capture files.
Capture file conversion

These tools convert between different capture file formats.

  • PcapNG.com Free online service that converts Pcap-NG files to plain libpcap (PCAP) format.
  • ProConvert convert capture files between different formats - some that Wireshark currently doesn't support (closed source freeware, unsupported and noted as buggy by vendor, registration and WildPackets maintenance contract required, Win32 only)
  • A list of tools Web page of links to various networking tools
  • dsniff is a collection of tools for network auditing and penetration testing (BSD style?, BSD/Linux/Solaris/...)
  • Network Security Toolkit (NST 22-7334) Fedora-based (F22) bootable Linux CD/DVD with best-of-breed open source network security tools. Provides a Web-Based frontend to the dumpcap network packet capture engine with dump file format: pcapng support. Simultaneous network packet capture on up to 4 network interfaces per Multi-Tap session is supported. Also provides IPv4 Address conversation geolocations and extensive HTML report generation from PDML and PSML packet decoding. See the article: Multi-Tap Network Packet Capturing for a tutorial and example usage. Capture starting can be delayed by a duration or an absolute date. Captures can be uploaded from NST to "CloudShark.org" or a"CloudShark Appliance" for viewing, sharing and analysis in a web browser (See: HowTo Use The NST CloudShark Upload Manager for additional information).
  • Packetfactory projects Various networking-related tools and libraries
  • Top 75 Security Tools from nmap users votes
USB capture

Raw USB traffic can be captured with Wireshark currently only under Linux, see CaptureSetup/USB. If it's an Ethernet (or any other network related) USB adapter, Wireshark can capture e.g. Ethernet traffic from that USB device if the platform supports it (which it usually will do). On Win32 you can however try:

  • SniffUSB "minor" updates and port of usbsnoop 1.8 (v2.0.0006 Feb 2007)
  • SnoopyPro based on usbsnoopy, last updated (v0.22) in 2002 (GPL, Win32)
  • Also usbsnoop seems to be by the same developer, but updated through 2001-2003 (latest v1.8)
  • usbsnoopy last updated (v0.13) in 2001 (no license, source incl., Win32)
Intrusion Analysis / SQL Database Support
  • C5 SIGMA from Command Five Pty Ltd automates TShark (Wireshark) to load large quantities of packet capture data into a SQL database using an automatically generated schema. C5 SIGMA flattens the Wireshark protocol tree into a relational table structure useful for intrusion analysis and data correlation with other systems. It also enables SQL queries against otherwise unnamed text fields visible in the Wireshark protocol tree by intelligently generating human readable names. C5 SIGMA is free software, released under GPL.
  • pcap2xml/sqlite This tool converts 802.11 packet traces (PCAP format) into an XML and SQLITE equivalent so you can now run XPATH/XQUERY/SQL queries on the packets.
Published: 23 June 2016

Add comment

Security code

Home Tools Wireshark Tools