Xplico is a Network Forensic Analysis Tool (NFAT).
The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP, MGCP, MEGACO, RTP), IRC, WhatsApp...
Xplico is able to classify more than 140 (application) protocols.
Xplico cam be used as sniffer-decoder if used in "live mode" or in conjunction with netsniff-ng.
Xplico is used also in CapAnalysis: http://www.capanalysis.net
Features
- Network Forensic
- Digital Forensics
- TCP/IP Protocol Decoder
- Packet Sniffer
- Sniffer
- PCAP Parser
- IPv4 and IPv6
License
GNU General Public License version 2.0 (GPLv2)
You Might Also Like
Our computer monitoring software allows employees, field contractors, and freelancers to manually clock in when they begin working on an assignment. The application will take screenshots randomly or at set intervals, which allows employers to observe the work process. The application only tracks activity when the employee is clocked in. No spying, only transparency.
Rate This Project
Login To Rate This Project
User Reviews
-
Xplico does not allow parallel compiling. The Makefile under manipulators/mwmail and system/script directories fail at the rule below when launching multiple GNU Make jobs (e.g. make -j4). Replace the *.pyc with $*.*.pyc and it will compile in parallel: %.pyc: %.py rm -f $@ $(PYCMPL) $< if [ -d "__pycache__" ]; then mv __pycache__/*.pyc $@; fi