# Monitoring

## Burp Suite Community Edition

Investigate website interactions using this web proxy.

**Website**: <https://portswigger.net>\
**Author**: PortSwigger\
**License**: Free, custom license: <https://portswigger.net/burp/tc-community>\
**Notes**: burpsuite\
**State File**: [remnux.packages.burpsuite-community](https://github.com/REMnux/salt-states/blob/master/remnux/packages/burpsuite-community.sls)

## Network Miner Free Edition

Examine network traffic and carve PCAP capture files.

**Website**: [https://www.netresec.com/](https://www.netresec.com)\
**Author**: NETRESEC AB\
**License**: GNU General Public License (GPL) v2: <https://www.netresec.com/?page=NetworkMinerSourceCode>\
**Notes**: networkminer\
**State File**: [remnux.tools.networkminer](https://github.com/REMnux/salt-states/blob/master/remnux/tools/networkminer.sls)

## PolarProxy

Intercept and decrypt TLS traffic.

**Website**: [https://www.netresec.com/](https://www.netresec.com)\
**Author**: NETRESEC AB\
**License**: Creative Commons Attribution-NoDerivatives 4.0 International (CC BY-ND 4.0) License: <https://www.netresec.com/?page=PolarProxy>\
**Notes**: polarproxy\
**State File**: [remnux.tools.polarproxy](https://github.com/REMnux/salt-states/blob/master/remnux/tools/polarproxy.sls)

## mitmproxy

Investigate website interactions using this web proxy.

**Website**: [https://mitmproxy.org/](https://mitmproxy.org)\
**Author**: <https://github.com/orgs/mitmproxy/people>\
**License**: MIT License: <https://github.com/mitmproxy/mitmproxy/blob/master/LICENSE>\
**Notes**: mitmproxy, mitmdump, mitmweb\
**State File**: [remnux.python3-packages.mitmproxy](https://github.com/REMnux/salt-states/blob/master/remnux/python3-packages/mitmproxy.sls)

## tshark

Capture and analyze network traffic with this console-based sniffer.

**Website**: <https://www.wireshark.org>\
**Author**: Gerald Combs and contributors: <https://www.wireshark.org/about.html#authors>\
**License**: GNU General Public License (GPL) v2: <https://www.wireshark.org/about.html#legal>\
**State File**: [remnux.packages.tshark](https://github.com/REMnux/salt-states/blob/master/remnux/packages/tshark.sls)

## wireshark

Capture and analyze network traffic with this sniffer.

**Website**: <https://www.wireshark.org>\
**Author**: Gerald Combs and contributors: <https://www.wireshark.org/about.html#authors>\
**License**: GNU General Public License (GPL) v2: <https://www.wireshark.org/about.html#legal>\
**State File**: [remnux.packages.wireshark](https://github.com/REMnux/salt-states/blob/master/remnux/packages/wireshark.sls)

## tcpdump

Capture and analyze network traffic with this command-line sniffer.

**Website**: [https://www.tcpdump.org/](https://www.tcpdump.org)\
**Author**: <https://github.com/the-tcpdump-group/tcpdump/blob/master/CREDITS>\
**License**: 3-Clause BSD license: <https://www.tcpdump.org/license.html>\
**State File**: [remnux.packages.tcpdump](https://github.com/REMnux/salt-states/blob/master/remnux/packages/tcpdump.sls)

## ngrep

Look for patterns in network traffic.

**Website**: <https://github.com/jpr5/ngrep/>\
**Author**: Jordan Ritter\
**License**: Free, custom license: <https://github.com/jpr5/ngrep/blob/master/LICENSE>\
**State File**: [remnux.packages.ngrep](https://github.com/REMnux/salt-states/blob/master/remnux/packages/ngrep.sls)

## tcpxtract

Extract files from network traffic.

**Website**: [http://tcpxtract.sourceforge.net/](http://tcpxtract.sourceforge.net)\
**Author**: Nick Harbour\
**License**: GNU General Public License (GPL) v2\
**State File**: [remnux.packages.tcpxtract](https://github.com/REMnux/salt-states/blob/master/remnux/packages/tcpxtract.sls)

## tcpflow

Analyze the flow of network traffic.

**Website**: <https://downloads.digitalcorpora.org/downloads/tcpflow/>\
**Author**: Simson L. Garfinkel\
**License**: GNU General Public License (GPL) v3: <https://github.com/simsong/tcpflow/blob/master/COPYING>\
**State File**: [remnux.packages.tcpflow](https://github.com/REMnux/salt-states/blob/master/remnux/packages/tcpflow.sls)

## tcpick

Capture and analyze network traffic with this command-line sniffer.

**Website**: <http://tcpick.sourceforge.net>\
**Author**: <http://tcpick.sourceforge.net/?t=1&amp;p=AUTHORS>\
**License**: GNU General Public License (GPL)\
**State File**: [remnux.packages.tcpick](https://github.com/REMnux/salt-states/blob/master/remnux/packages/tcpick.sls)

## cs-parse-traffic.py

Decrypt and parse Cobalt Strike beacon network traffic.

**Website**: <https://blog.didierstevens.com/2021/11/29/new-tool-cs-parse-traffic-py/>\
**Author**: Didier Stevens: <https://x.com/DidierStevens>\
**License**: Public Domain\
**State File**: [remnux.scripts.didier-stevens-scripts](https://github.com/REMnux/salt-states/blob/master/remnux/scripts/didier-stevens-scripts.sls)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.remnux.org/discover-the-tools/explore+network+interactions/monitoring.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
