The command line

Helps you find credentials and other interesting stuff in network captures.

usage: credslayer [-h] [-l INTERFACE] [-lo FILE] [-o FILE]
                  [-s {enable,disable}] [-f IP] [-m PORT:PROTOCOL] [--debug]
                  [pcapfiles [pcapfiles ...]]

Positional Arguments

pcapfiles

pcap files you want to analyse

Named Arguments

-l, --listen

start active processing on specified interface

-lo, --listen-output

output captured packets to a pcap file

-o, --output

output captured credentials to a file

-s, --string-inspection

Possible choices: enable, disable

whether you want to look for interesting strings (email addresses, credit cards, …) or not (pretty heavy on the CPU, enabled by default on pcap files, disabled on live captures)

-f, --filter

process packets involving the specified IP

-m, --map

map a port to a protocol

--debug

put CredSLayer and pyshark in debug mode

Default: False