Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

This tool is designed to help penetration testers and network administrators identify potential security threats, especially those targeting web applications such as SQL injection, XSS, and WebShells. Its modular desig 该工具适用于 HW 蓝队对网络流量的深入分析,帮助安全研究人员、渗透测试人员及网络管理员等专业人士识别潜在的安全威胁,尤其是针对 Web 应用的攻击(如 SQL 注入、XSS、WebShell 等)。其模块化设计使用户能够根据实际需求自由选择并定制各类功能模块

Notifications You must be signed in to change notification settings

CuriousLearnerDev/TrafficEye

Repository files navigation

English | 中文

🔧 TrafficEye — Network Traffic Analysis & Security Detection Tool


📣 Issue Feedback Group

Issue Feedback


📥 Download Links


🛠️ How to Use

📺 Video Tutorials:https://www.bilibili.com/video/BV1VTMRz1ENN

🔧 Linux Users

⚠️ Dependency Required: tshark must be installed

Install with:

sudo apt install tshark

Run:

unzip linux_amd_x64_0.0.8.9-2.zip
cd linux_amd_x64_0.0.8.9-2
chmod +x trafficeye
./trafficeye

🖱️ Windows Users

tshark is already integrated, no need to install separately.

Run:

Double-click to launch the main executable.

📄 Security Detection Rules

Rule Syntax

Security detection rules are defined under the safety_testing section in the config.yaml file.

Identifier Description
ALL Match all fields
!xxx Exclude field xxx from detection
URI Complete URL
URI_key Key names in the URL query
URI_value Values in the URL query
ALL_headers All HTTP headers
headers:xxx Specific header, e.g., headers:cookie
binary Raw binary content
forms_body Whole form content
forms_key_body Key names in form data
forms_value_body Values in form data
json_body Entire JSON body
json_key_body JSON key names
json_value_body JSON values
json_item_body JSON list items
xml_body Whole XML content
xml_value_body XML node values
xml_attribute_body XML attribute values
multipart_body Entire multipart content
multipart_file_name_body Uploaded file names
multipart_content_type_body Uploaded file MIME types
multipart_data_body Binary content of uploaded files

Example Rule

safety_testing:
 Directory_Traversal_Attack:
 name:
 - "Directory traversal payload using (/../) or (/.../)"
 detection_location:
 - 'URI|forms_key_body|multipart_file_name_body|ALL_headers|xml_value_body|!headers:referer'
 rules:
 - >-
 (?:(?:^|[\x5c/;])\.{2,3}[\x5c/;]|[\x5c/;]\.{2,3}[\x5c/;])
 severity:
 - Medium

For example

safety_testing:
 Directory_Traversal_Attack:
 name:
 - "Directory traversal payload using (/../) or (/.../)"
 detection_location:
 - 'URI|forms_key_body|multipart_file_name_body|ALL_headers|xml_value_body|!headers:referer'
 rules:
 - >-
 (?:(?:^|[\x5c/;])\.{2,3}[\x5c/;]|[\x5c/;]\.{2,3}[\x5c/;])
 severity:
 - Medium

This rule will detect directory traversal in the following fields:

  1. URI → The entire URL string, e.g.:

    http://example.com/download.php?file=../../etc/passwd
    
  2. forms_key_body → The key name in a form submission, e.g.:

    username=admin&file=../../../etc/shadow
    ↑ This is detected in forms_key_body
    
  3. multipart_file_name_body → The filename field during file uploads, e.g.:

    Content-Disposition: form-data; name="upload"; filename="../../shell.php"
    
  4. ALL_headers → All HTTP headers, such as User-Agent, Cookie, X-Forwarded-For, etc.

  5. xml_value_body → The value of a node in XML content, e.g.:

    <config>../../etc/passwd</config>
    
  6. !headers:referer → Excludes detection in the Referer HTTP header.


📅 Development Progress

  • Note: The source code is no longer publicly available after version 0.0.7.

    • 2025年07月12日:The problem of the large security analysis file crashing (with size analysis set)

    • 2025年07月10日:Add geoip2IP query

    • 2025年07月09日: Beautification generation Report

    • 2025年07月08日: Add English display

    • 2025年06月07日: Security detection rule writing completed

    • 2025年05月25日: Added detailed rule matching display, including rule, severity level, match location, and risk highlight

    • 2025年05月24日: Introduced risk analysis module

    • 2025年05月10日: Performance optimization: separated data and view, avoided repeated icon loading, reduced GUI overhead, and made models lazy-loaded

    • 2025年05月03日: Added statistics for IP access to URIs

    • 2025年05月02日: Real-time interactive experience for log analysis (dynamic updates)

    • 2025年05月01日: Fixed display bugs, improved multi-core processing for large LOG file analysis

    • 2025年04月28日: Optimized memory usage for large traffic file analysis; auto-write to disk when output exceeds 200,000 lines

    • 2025年04月28日: Performance testing completed — WEB log module can handle 2GB files and 4 million entries

    • 2025年04月26日: By default, AI detection and binary traffic identification are disabled to improve speed

    • 2025年04月24日: Further performance tuning

    • 2025年04月23日: Statistical analysis charts now support full-screen view

    • 2025年04月20日: Optimized traffic parsing speed and GUI; added AI analysis for URI, headers, and body content

    • 2025年04月19日: Improved basic AI threat detection module

    • 2025年04月18日: Began development of threat intelligence module

    • 2025年04月17日: Started working on AI analysis engine

    • 2025年04月15日: Added TLS decryption support

    • 2025年04月14日: GUI optimization and feature refinement

    • 2025年04月13日: Introduced binary file extraction functionality

    • 2025年04月12日: Started development of binary extraction module

    • 2025年04月11日: Began GUI modifications

    • 2025年04月10日: Started writing detection regex patterns

    • 2025年04月10日: Refactored core processing logic

    • 2025年04月09日: Initiated log extraction module

    • 2025年04月08日: Started working on regex patterns for log parsing

    • 2025年04月06日: Session replay module development begins

    • 2025年04月05日: Designed structured output stream logic

    And more under continuous development...


🧪 Tool Overview

TrafficEye is a modular traffic analysis and threat detection tool tailored for blue team operations, penetration testing, and network defense. It helps uncover web-based threats (e.g., SQLi, XSS, Webshells) and supports extensive customization and automation.


🧱 Architecture Overview

Architecture


🚀 Key Features

✅ Packet Capture Analysis

  • Supports .pcapng files
  • HTTP data extraction for Burp Suite
  • POST data in text and hex
  • Filtered URI & HTTP payload output

📄 Log File Analysis

  • Apache, Nginx, JSON, F5, HAProxy, Tomcat, IIS

🔁 Traffic Replay

  • Raw request replay
  • Binary request replay
  • Session-based replay (e.g., Godzilla multi-request WebShell sessions)

📦 Binary Extraction

  • Java, C# serialized data
  • ZIP, 7z, RAR, TAR, GZ
  • Images (JPG, PNG, etc.)
  • Audio/Video (MP3, MP4, etc.)
  • Scripts, documents, emails, databases

📊 Statistics

  • URI, IP, methods, frequency
  • GeoIP resolution

🧰 Security Detection

  • Info leak
  • Directory traversal
  • LFI/RFI
  • RCE
  • SQL injection
  • XSS

🧠 AI-based Detection

  • URI/body/header focused analysis
  • Automated batch threat analysis

📸 GUI Preview


📁 Code Structure Overview

  • main.py: Entry point
  • core_processing.py: HTTP parsing engine
  • binary_extraction.py: Binary extraction logic
  • log_parsing/: Log format identification and parsers
  • replay_request.py: Traffic replay
  • url_statistics.py: URI & IP statistics
  • history/: Persistent scan results
  • lib/: IP location, CLI, icons, etc.
  • modsec/: OWASP ModSecurity rule integration
  • config.yaml: All customizable rules & settings

🙏 Special Thanks

  • Zhigong Shanfang Lab
  • SnowBaby
  • ChinaRan404
  • TangTang
  • niuᴗu
  • SnowBaby
  • Woshuwacao

🧠 Future Plans

  • ✅ Log alerting system
  • ✅ Threat Intelligence API integration (VT, CriminalIP, AbuseIPDB)
  • ✅ ModSecurity rule simulation
  • ✅ WebShell detection (Godzilla, Behinder, AntSword, etc.)

📬 Author's Official WeChat

img

About

This tool is designed to help penetration testers and network administrators identify potential security threats, especially those targeting web applications such as SQL injection, XSS, and WebShells. Its modular desig 该工具适用于 HW 蓝队对网络流量的深入分析,帮助安全研究人员、渗透测试人员及网络管理员等专业人士识别潜在的安全威胁,尤其是针对 Web 应用的攻击(如 SQL 注入、XSS、WebShell 等)。其模块化设计使用户能够根据实际需求自由选择并定制各类功能模块

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

AltStyle によって変換されたページ (->オリジナル) /