A Wireshark-style network packet analyzer TUI, built with Rust + Ratatui in the style of binsider.
__ __
___________ ____ | | ______________ _/ |_
\____ \__ \ _/ ___\| |/ /\_ __ \__ \\ __\
| |_> > __ \\ \___| < | | \// __ \| |
| __(____ /\___ >__|_ \ |__| (____ /__|
|__| \/ \/ \/ \/
| Tab |
Contents |
| 1 Packets |
Live packet list with protocol tree + hex dump |
| 2 Analysis |
Protocol stats, top talkers, conversations, port summary |
| 3 Strings |
Extracted strings with sensitive data flagging |
| 4 Dynamic |
Live syscall / signal / network trace log |
| 5 Visualize |
Protocol bars, traffic sparkline, top IPs, geo endpoints |
# Install Rust (one-time) — https://rustup.rs
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
cd packrat
cargo run # dev build
cargo build --release # optimised binary
./target/release/packrat # macOS / Linux
.\target\release\packrat.exe # Windows
| Key |
Action |
Space |
Start / Stop capture |
j/k ↑↓ |
Navigate |
g / G |
Top / Bottom |
1–5 |
Switch tabs |
/ |
Filter |
C |
Clear |
q |
Quit |
tcp ip.src==192.168.1.1
dns ip.dst==8.8.8.8
http tcp.port==443
| Platform |
Terminal |
Status |
| Linux |
Any |
✅ |
| macOS |
iTerm2 / kitty |
✅ |
| Windows |
Windows Terminal |
✅ |
| WSL2 |
Any |
✅ |
MIT — see LICENSE