This project is strictly for educational and authorized cybersecurity research purposes.
Do not deploy this tool on systems you do not own or have written permission to test. Unauthorized use is illegal.
Ghost Network Sniffer is a packet analysis tool designed for ethical cybersecurity research, network diagnostics, and educational use. Built with Python and Scapy, it provides real-time traffic inspection with an intuitive dark-mode GUI.
- 🕵️♂️ Real-time packet capture (TCP, UDP, HTTP, DNS, ICMP)
- 📊 Detailed protocol analysis (Ethernet, IP, TCP/UDP headers, payload inspection)
- 🔍 Advanced filtering (by protocol, port, or custom BPF syntax)
- 💾 PCAP export for further analysis in Wireshark/Tshark
- 🖥️ Cross-platform (Windows, Linux, macOS)
- 🎨 User-friendly interface with dark theme and dynamic stats
-
Clone the repository:
git clone https://github.com/yourusername/ghost-network-sniffer.git cd ghost-network-sniffer -
Install dependencies:
pip install -r requirements.txt
-
Run the sniffer (Admin privileges recommended):
python main.py
- Select a network interface from the dropdown.
- Filter traffic by protocol (All/TCP/UDP/HTTP/DNS/ICMP).
- Start/Stop capture with dedicated buttons.
- Inspect packets in the table and view full details below.
- Export sessions to PCAP for offline analysis.
(Replace with actual screenshots)
This tool is not for:
❌ Unauthorized network monitoring
❌ Penetration testing without permission
❌ Any illegal activities
By using this software, you agree to use it responsibly and lawfully.
MIT License
Buy me a coffee - 0xf89c84554c78B3194A56042bd803CcA62EA423E9
👻 Ghost - Because even ghosts leave traces.