by ninedter
PCAP Hunter is an AI threat hunting workbench. It uses Zeek and Tshark to analyze PCAPs, enriched by OSINT. Features include a world map, JA3 forensics, and C2 detection. It generates multi-language security reports via local or cloud LLMs, prioritizing privacy and speed.
# Add to your Claude Code skills
git clone https://github.com/ninedter/pcap-hunterPCAP Hunter is an AI-enhanced threat hunting workbench that bridges manual packet analysis and automated security monitoring. It empowers SOC analysts and threat hunters to rapidly ingest, analyze, and extract actionable intelligence from raw PCAP files.
By combining industry-standard network analysis tools (Zeek, Tshark, PyShark) with Large Language Models (LLMs) and OSINT APIs, PCAP Hunter automates the tedious parts of packet analysis — parsing, correlation, and enrichment — so analysts can focus on detection and response.
📖 User Manual (English) | 中文說明 (Traditional Chinese)
No comments yet. Be the first to share your thoughts!
1 − Π(1 − wᵢsᵢ) (Bayesian independence model) instead of linear summation, producing diminishing returns while allowing multiple weak signals to compound meaningfully.-c optimization — Packet limit enforced at the tshark level for zero-waste I/O.conn.log, dns.log, http.log, ssl.log.tshark with automatic SHA256 hashing.Integrates with leading threat intelligence providers:
app/
├── analysis/ # Correlation engine, flow analysis, IOC scorer, narrator
├── database/ # Case management (SQLite)
├── llm/ # LLM client & multi-language report generation
├── pipeline/ # 10-stage analysis pipeline
│ ├── beacon.py # C2 beaconing detection
│ ├── carve.py # HTTP payload carving
│ ├── dns_analysis.py # DGA, tunneling, fast flux
│ ├── geoip.py # GeoIP resolution
│ ├── ja3.py # JA3/JA3S fingerprinting
│ ├── batch.py # Multi-PCAP batch processing & correlation
│ ├── osint.py # OSINT provider queries (parallel)
│ ├── osint_cache.py # SQLite OSINT caching layer
│ ├── rdns_cache.py # SQLite reverse-DNS caching layer
│ ├── tls_certs.py # Certificate validation
│ └── yara_scan.py # YARA rule scanning
├── reports/ # PDF report generation
├── security/ # OPSEC hardening & data sanitization
├── threat_intel/ # MITRE ATT&CK mapping
├── ui/ # Streamlit interface (8 tabs)
├── utils/ # Export, GeoIP, config, binary discovery, network utils
├── config.py # Application defaults
└── main.py # Streamlit entry point