A blazingly fast multiplatform packet sniffer built with Tauri!
MIT License
A blazingly fast multiplatform packet sniffer built with Tauri!
If you prefer building from source code, you must install all the Tauri's dependencies, clone the repo and run npm run tauri build
Interception: sets the network adapter in promiscuous mode and reconstructs all the info related to the collected packets. For now, the list of fully parsed packets is:
The interception can be paused, in order to be subsequently resumed, or stopped.
Filtering: the collected packets can be filtered out by means of packet type (eg. IPv4, TCP, ...) or packet inner fields (eg. Source IP, Destination MAC, ...)
Source IP,Destination IP,Source Port,Destination Port,First Data Exchange,Last Data Exchange,Bytes Exchanged,Protocols
192.168.158.49,185.199.111.154,53826,443,2022-10-19 16:54:13,2022-10-19 16:54:14,12837,TCP;IPv4;TLS
192.168.158.49,216.58.209.42,53798,443,2022-10-19 16:54:10,2022-10-19 16:54:10,120,IPv4;TCP
192.168.158.49,192.168.158.100,-,-,2022-10-19 16:54:17,2022-10-19 16:54:17,42,ARP
192.168.158.49,34.158.0.131,61392,443,2022-10-19 16:54:19,2022-10-19 16:54:19,184,IPv4;TLS;TCP
WinPcap is needed, along with the WinPcap Developer's Pack. Add the /Lib
or /Lib/x64
folder to your LIB
environment variable.
On Debian based Linux, install libpcap-dev
. If not running as root, you need to set capabilities like so: sudo setcap cap_net_raw,cap_net_admin=eip path/to/bin
libpcap
should be installed on Mac OS X by default.