A Python-based tool for analyzing network packet captures.
python3 analyze.py [-h] [-c CAPTURE] [-s SECRET] [-o OUTPUT] [-i INDEX] [-v] [--signature HEX]This is a wireshark pcap capture file or more modern that tshark supports.
This operator uses for password.
You can save the output to a file.
The index of a initial ic2kp packet, 40 bytes in size.
You can verbose the output.
The magic signature that the client and server used during CHAP.
python3 analyze.py -c capture.pcap -s S3cr3tP@ss -o output.txt -vv| OS | Version | Python | Status |
|---|---|---|---|
| macOS (Apple M2) | Sequoia 15.2 | 3.13.1 | ✅ Tested & Working |
| Windows | 11 Home 24H2 | 3.11.4 | ✅ Tested & Working |
| Kali Linux | 2024.4 | 3.11.9 | ✅ Tested & Working |
- Clone the repository
git clone https://github.com/replay9zz/rekobee_analyzer.git
cd rekobee_analyzer- Create and activate virtual environment (Required)
python -m venv .venv
source .venv/bin/activate- Install required packages
pip install -r requirements.txt- Change tshark and dumpcap path (Required)
Original repository: havokzero/rekobee_analyzer