Dshell
๐ Network Recon ยท Python
Dshell is a network forensic analysis framework developed by the US Army Research Laboratory. It provides a Python-based infrastructure for rapidly developing custom network packet decoders and analyzers. Dshell processes pcap files through a plugin chain, enabling analysts to extract specific protocols, identify suspicious traffic patterns, and reconstruct network sessions. Included plugins handle DNS, HTTP, SMTP, NetFlow, and other protocols. Its chainable decoder architecture allows complex analysis workflows to be built from simple reusable components.
Installation
$ git clone https://github.com/USArmyResearchLab/Dshell.git && cd Dshell && python3 setup.py installUse Cases
- Network forensic analysis of pcap captures
- Developing custom protocol decoders
- Extracting files and credentials from network traffic
- Incident response network analysis
Tags
Details
- Category
- ๐ Network Recon
- Language
- Python
- Repository
- USArmyResearchLab/Dshell
- Platforms
- ๐งlinux๐macos
Links
Community Reviews
Alternatives & Comparisons
Wireshark
C/C++The world's foremost network protocol analyzer. Deep packet inspection for hundreds of protocols.
Compare Dshell vs WiresharkScapy
PythonInteractive packet manipulation library. Craft, send, capture, and decode network packets with a powerful Python interface.
Compare Dshell vs ScapyMore in Network Recon
Nmap
C/C++The gold standard network scanner. Host discovery, port scanning, service/version detection, OS fingerprinting.
Masscan
CInternet-scale port scanner. Transmits 10 million packets per second. Asynchronous, stateless scanning.
RustScan
RustBlazing fast port scanner that pipes into Nmap. Scans all 65k ports in 3 seconds flat.
Shodan CLI
PythonCommand-line interface for Shodan, the search engine for internet-connected devices.
Wireshark
C/C++The world's foremost network protocol analyzer. Deep packet inspection for hundreds of protocols.
Responder
PythonLLMNR/NBT-NS/mDNS poisoner and rogue authentication server. Captures NTLMv1/v2 hashes on the network.