Skip to content

ShadowParse is a high-fidelity PCAP forensics engine designed for automated deep packet inspection and cryptographic discovery. Developed to streamline CTF investigations and network traffic analysis, it features the DeepRead Integration for recursive decoding of obfuscated payloads.

Notifications You must be signed in to change notification settings

arazazi/ShadowParse

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

8 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

ShadowParse: The Luxe PCAP Forensics Engine ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ›ก๏ธ

ShadowParse is a high-performance PCAP analysis and forensics tool designed for security researchers and CTF players. It combines deep packet inspection (DPI) with the DeepRead Integration, an automated multi-layered decoding engine.

โœจ Key Features

  • Dual Scan Modes:
    • Basic Scan: Rapid analysis for quick flag hunting and traffic overviews.
    • Deep Scan: Full TCP/UDP stream reconstruction and multi-depth cipher analysis.
  • DeepRead Universal Decoder: Automatically detects and decodes over 40+ encodings and ciphers (Base64, Caesar, Rot47, Morse, Tap Code, etc.).
  • Automatic Forensics: Extracts files from HTTP traffic and identifies high-entropy payloads (potential encrypted C2 traffic).
  • Comprehensive Reporting: Generates interactive Markdown reports, JSON data exports, and filtered PCAPs of suspicious traffic.

๐Ÿš€ Installation

  1. Clone the repository:
   git clone https://github.com/arazazi/ShadowParse.git
   cd ShadowParse
  1. Install dependencies:
pip install -r requirements.txt

๐Ÿ› ๏ธ Usage

Basic Scan (Fast)

python shadowparse.py -f evidence.pcap --basic-scan

Deep Scan (Thorough)

python shadowparse.py -f evidence.pcap -o ctf_report_folder

๐Ÿ“Š Output

ShadowParse generates a structured report folder containing:

  • shadow_report.md: A human-readable summary of all findings.
  • flags.json: All captured unique flags (CTF style).
  • extracted_files/: Any files recovered from the network streams.
  • suspicious_traffic.pcap: A filtered PCAP containing only the "weird" or suspicious packets for further analysis in Wireshark.

โš–๏ธ License

This project is licensed under the MIT License.

About

ShadowParse is a high-fidelity PCAP forensics engine designed for automated deep packet inspection and cryptographic discovery. Developed to streamline CTF investigations and network traffic analysis, it features the DeepRead Integration for recursive decoding of obfuscated payloads.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages