A Python tool to analyze, explore, and revive malicious HTTP traffic from PCAP files for security research.
CapTipper is a Python tool for analyzing and exploring malicious HTTP traffic captured in PCAP files. It helps security researchers dissect network flows, identify malicious payloads, and understand attack sequences by simulating the original web server and providing an interactive console for deep inspection. The tool is particularly useful for investigating exploit kits, obfuscated scripts, and shellcode delivery mechanisms.
Security researchers, malware analysts, and digital forensics professionals who need to inspect malicious web traffic, reverse-engineer exploit kits, or analyze drive-by download attacks.
CapTipper offers a unique interactive environment that combines server simulation with powerful analysis commands, allowing researchers to dynamically explore malicious traffic as if it were live. Unlike static PCAP analyzers, it enables replaying requests, extracting payloads, and visualizing traffic flows in a single integrated tool.
Malicious HTTP traffic explorer
CapTipper provides a command-line interpreter with commands like 'hosts', 'hexdump', and 'iframes', enabling step-by-step exploration of malicious traffic, as shown in the Nuclear EK example analysis.
It sets up a local web server that mimics the original server in the PCAP, allowing researchers to replay HTTP requests and receive responses, facilitating dynamic behavioral analysis.
The tool supports dumping objects, decompressing gzip content with 'ungzip', extracting files from ZIP containers, and integrating VirusTotal checks for hash-based malware detection.
Using the 'hosts' command, CapTipper displays host-based traffic trees to visually identify compromised sites, infection hosts, and redirection chains.
CapTipper focuses exclusively on HTTP traffic, making it ineffective for analyzing other protocols commonly found in PCAPs, such as DNS or encrypted HTTPS streams.
The README notes Python3 support is in a separate branch from 2020, indicating the main version may be outdated and not actively maintained for modern Python environments.
It relies entirely on a command-line interpreter, lacking a graphical user interface, which can increase the learning curve compared to GUI-based tools like Wireshark.
Malicious traffic detection system
Arkime is an open source, large scale, full packet capturing, indexing, and database system.
Network Analysis Tool
PcapPlusPlus is a multiplatform C++ library for capturing, parsing and crafting of network packets. It is designed to be efficient, powerful and easy to use. It provides C++ wrappers for the most popular packet processing engines such as libpcap, Npcap, WinPcap, DPDK, AF_XDP and PF_RING.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.