Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Analyze local PCAP/PCAPNG files with tshark to generate detailed network forensics reports including talkers, ports, DNS, TLS, HTTP, and anomaly summaries.
Analyze local PCAP/PCAPNG files with tshark to generate detailed network forensics reports including talkers, ports, DNS, TLS, HTTP, and anomaly summaries.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
This skill turns packet captures into a practical report a human can act on. It is designed for lab work, incident triage, and CPENT-style exercises.
A structured report with: Capture metadata: file type, size, first/last timestamp (if available) Top talkers: endpoints by packets/bytes (IPv4/IPv6 when present) Conversations: top TCP/UDP conversations Service/port view: top TCP/UDP destination ports DNS: most common queried names + suspicious patterns (DGA-ish, long labels) TLS: SNI / Server Name and common JA3-like fingerprints when present (best-effort) HTTP: host headers / URLs when present (best-effort, only if decrypted/plain) Anomalies (best-effort heuristics): SYN-only scans / high SYN rate excessive RSTs retransmission bursts rare destination ports single host contacting many unique hosts (beaconing-like)
You must provide: pcap_path: Full path to a .pcap or .pcapng file on this machine. Optional: focus_host: IP to focus on (filters summaries around that host) time_window: A display filter time window if user specifies (best-effort guidance only)
{baseDir}/scripts/analyze.sh "/full/path/to/capture.pcapng"
Data access, storage, extraction, analysis, reporting, and insight generation.
Largest current source with strong distribution and engagement signals.