AI Packet Insights
Drop a .pcap
or .pcapng
file — our machine-learning engine performs
AI packet
inspection and delivers a detailed security report in minutes.
Generating Your Intelligence Report
Applying machine learning models to identify threats and MITRE tactics...
What you'll get
Example — real capture
FTP credentials in cleartext
T1040 · T1048.003
C2 channel via FTP data exfiltration
T1041
Active directory reconnaissance
T1018
Exact credentials, packet refs, remediation — in full PDF
All findings · MITRE ATT&CK mapped
Evidence, packet references, remediation
Exposed credentials & hashes
Cleartext, NTLM, Kerberos tickets
Traffic map & protocol breakdown
Top talkers, flows, anomaly timeline
Executive summary
Risk score & recommended actions
Upload is free. The summary shows what was found. The PDF shows exactly where, with evidence and remediation steps.
How It Works
Upload your capture file and get a full AI forensics report in minutes.
-
1
Choose a PCAP file
Click the Choose a file… button and select a
.pcapor.pcapngfile from your machine. -
2
Start the upload
Press Upload to begin the secure transfer. A progress bar tracks the upload in real time.
-
3
Wait for AI analysis
The AI engine decodes protocols, detects anomalies, maps threats to MITRE ATT&CK, and compiles a PDF report — usually under two minutes.
-
4
Get the report link
Once processing is complete, a secure download link appears on the page.
-
5
Download within 24 hours
Click the link to download your report. For security, the original file and report are automatically deleted after 60 minutes.