A TCP/IP packet demultiplexer that captures and reconstructs TCP connections into separate files for protocol analysis and forensics.
tcpflow is a command-line network analysis tool that captures TCP/IP traffic and reconstructs individual TCP connections into separate files. It solves the problem of analyzing network protocols by providing complete session data rather than isolated packets, making it invaluable for debugging, reverse engineering, and forensic investigations.
Network administrators, security researchers, digital forensics analysts, and developers who need to inspect TCP traffic for protocol analysis, malware investigation, or application debugging.
Developers choose tcpflow over generic packet analyzers because it automatically reconstructs and organizes TCP streams into usable files, supports forensic metadata output, and specializes in HTTP content extraction—all through a lightweight, Unix-friendly tool.
TCP/IP packet demultiplexer. Download from:
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Reassembles TCP streams correctly despite retransmissions or out-of-order delivery, ensuring complete session data for analysis.
Automatically interprets HTTP responses, extracts bodies, and decompresses GZIP content, making web traffic analysis straightforward.
Generates DFXML reports with MD5 hashes and connection statistics, providing detailed forensic evidence for investigations.
Supports libpcap filtering expressions identical to tcpdump, allowing precise control over captured traffic.
Explicitly cannot handle IP fragments, as admitted in the README, limiting effectiveness in networks where fragmentation occurs.
Building from source requires OS-specific configuration scripts and manual steps, adding setup overhead compared to package managers.
Creates separate files for each TCP flow, which can become unwieldy with large captures and requires post-processing organization.