Skip to content

Amin-moniry-pr7/adcAM-Sniffer-A-Mini-Wireshark

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

adcAM Sniffer

Typing SVG

Version Python License Status

GitHub Stars GitHub Forks GitHub Issues

Overview

adcAM Sniffer is a powerful, real-time network packet analyzer designed for security professionals, penetration testers, and network administrators. Built with Python and featuring a modern web-based interface, it provides deep insights into network traffic with advanced credential detection capabilities.


Key Features

Features


🕵️ Advanced Analysis

Deep packet inspection
Protocol recognition
Domain resolution
Port scanning detection


🚨 Credential Detection

Multi-pattern recognition
Real-time alerts
Smart filtering
Export capabilities


📈 Live Monitoring

Real-time packet stream
Protocol statistics
Session summary
Display filters

Tech Stack

💻 Core Technologies

Python JavaScript

📚 Libraries & Frameworks

Scapy Eel Bcrypt SQLite

🛠️ Tools & Protocols

Wireshark Npcap

Protocols

Installation

⚡ Quick Start

# Clone the repository
git clone https://github.com/Amin-moniry-pr7/adcAM-Sniffer.git
cd adcAM-Sniffer

# Install dependencies
pip install -r requirements.txt

# Download and install Npcap (Windows)
# Visit: https://nmap.org/npcap/

# Run as Administrator/Root
python run.py

📋 Requirements

Component Minimum Recommended
OS Windows 10, Linux, macOS Windows 11, Ubuntu 22.04
Python 3.8+ 3.11+
RAM 2 GB 4 GB+
Network Any NIC Gigabit Ethernet

Usage

🎮 Basic Workflow

1️⃣ First-Time Setup

  • Register an account with your activation code
  • Login to access the dashboard
  • Select your active network interface

2️⃣ Start Capturing

  • Set capture filters (HTTP, HTTPS, DNS, etc.)
  • Click "▶ Start Sniffing"
  • Monitor live packets in real-time

3️⃣ Analyze Traffic

  • View packet details with layer information
  • Apply display filters (IP, protocol, domain)
  • Watch for red-highlighted credentials

4️⃣ Export Data

  • Save packets as PCAP files
  • Export detected credentials to TXT
  • Generate session reports

Screenshots

🎨 Modern Interface

Welcome Screen
Welcome Screen
Dashboard
Live Dashboard
Packet Details
Packet Analysis
Alerts
Credential Alerts

Advanced Features

🔧 BPF Filter Examples

# Capture only HTTP traffic
"tcp port 80"

# Capture HTTP and HTTPS
"tcp port 80 or tcp port 443"

# Capture traffic from specific IP
"host 192.168.1.100"

# Capture DNS queries
"udp port 53"

# Exclude certain IPs
"not host 192.168.1.1"

🎨 Protocol Color Coding

Protocol Color Description
🔴 HTTP Red Unencrypted traffic
🟢 HTTPS Green Encrypted traffic
🟠 FTP Orange File transfer
🟣 DNS Purple Domain lookups
🔵 TCP Blue General TCP
🟡 UDP Yellow General UDP

Security

🛡️ Security Features

Security

⚠️ Important Warnings

  • Legal Use Only - Only use on networks you own or have permission to test
  • Administrator Rights - Requires elevated privileges to capture packets
  • Sensitive Data - All captured credentials are stored locally
  • Network Impact - May cause increased network load during capture

📋 Best Practices

✓ Always use on isolated test networks
✓ Clear sensitive data after testing
✓ Use strong passwords for registration
✓ Keep activation codes confidential
✓ Run antivirus scans regularly
✓ Update to latest version

Contributing

Contributions are welcome! 🎉

Fork Issues Pull Request

# Fork the repository
# Create a feature branch
git checkout -b feature/AmazingFeature

# Commit your changes
git commit -m 'Add AmazingFeature'

# Push to the branch
git push origin feature/AmazingFeature

# Open a Pull Request

Version History

📈 Releases

Version Date Highlights
v5.1 2025 Enhanced credential detection, Modern UI, Performance improvements
v5.0 2024 Complete UI redesign, Real-time statistics dashboard
v4.x 2024 Initial public release, Basic packet capture

License

Non-Commercial Use License v3.0

Copyright © 2025 Amin Moniry (adc7). All rights reserved.

License

✅ Permitted Uses

  • Personal, educational, and research purposes
  • Non-profit organization activities
  • Legitimate security testing
  • Modification for non-commercial purposes

❌ Prohibited Uses

  • Any commercial use or financial gain
  • Selling or licensing the software
  • Providing paid services
  • Integration into commercial products

Contact & Support

📞 Get in Touch

Email GitHub Telegram YouTube

💡 Support Options

Type Link
🐛 Bug Reports Open an Issue
💡 Feature Requests Submit Request
📖 Documentation Read the Docs

Acknowledgments

Special thanks to the amazing open source community! 🙏



Scapy Team
Packet manipulation library


Eel Project
Python-JavaScript integration


Nord Theme
Beautiful color scheme


Community
Inspiration and support

Statistics




🌟 If you find this project useful, please give it a star!

Star History

⚡ Quick Start Cheatsheet

git clone https://github.com/Amin-moniry-pr7/adcAM-Sniffer.git
cd adcAM-Sniffer
pip install -r requirements.txt
python run.py

1. Register → 2. Login → 3. Select Interface → 4. Start Sniffing!

Footer

About

🚨 adcAM Sniffer is a real-time network packet analyzer that automatically detects credentials, passwords, and sensitive data in HTTP, HTTPS, DNS, and FTP traffic. It features a modern dashboard with live monitoring, instant alerts, and PCAP export for security testing and penetration analysis.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors