pcap-analyzerAnalyze local PCAP/PCAPNG files with tshark to generate detailed network forensics reports including talkers, ports, DNS, TLS, HTTP, and anomaly summaries.
Install via ClawdBot CLI:
clawdbot install marposins/pcap-analyzerGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Generated Mar 1, 2026
Security analysts use this skill to quickly assess a suspicious PCAP file after a network breach alert, identifying top talkers, anomalous traffic patterns like port scans or beaconing, and extracting indicators such as DNS queries and TLS fingerprints for further investigation.
Students or trainees in cybersecurity certification programs (e.g., CPENT) apply this skill to analyze provided PCAP files, learning to interpret network conversations, service usage, and anomaly detection in a controlled, educational environment without modifying original data.
IT auditors leverage this skill to examine network traffic captures from organizational systems, verifying compliance with policies by summarizing traffic patterns, identifying unauthorized services or ports, and flagging potential data exfiltration attempts in a read-only manner.
Malware researchers analyze PCAP files from sandboxed environments to understand command-and-control communications, extract DNS queries for domain blacklisting, and detect TLS fingerprints associated with malicious payloads, aiding in threat intelligence gathering.
Network engineers use this skill to diagnose issues in captured traffic, identifying retransmission bursts, excessive RSTs, or unusual port activity that may indicate configuration errors or hardware failures, focusing on specific hosts or time windows as needed.
Offer a basic version of this skill for free to individual users or small teams, with premium features like advanced anomaly detection or integration with SIEM systems available via subscription, generating revenue from enterprise customers seeking enhanced network forensics capabilities.
Cybersecurity consulting firms bundle this skill as part of their incident response or audit packages, using it to provide clients with quick, structured reports from PCAP analysis, thereby increasing service value and enabling upselling for deeper investigations.
Integrate this skill into online cybersecurity training platforms or virtual labs, where students pay for access to hands-on exercises involving PCAP analysis, driving revenue through course enrollments or platform licensing agreements with educational institutions.
💬 Integration Tip
Ensure tshark and required binaries are installed on the system; for optimal use, provide clear paths to PCAP files and consider setting focus_host to narrow analysis in large captures.
Scored Apr 15, 2026
Bambu Lab 3D printer control and automation. Activate when user mentions: printer status, 3D printing, slice, analyze model, generate 3D, AMS filament, print...
Perform IP geolocation lookups using ipinfo.io API. Convert IP addresses to geographic data including city, region, country, postal code, timezone, and coordinates. Use when geolocating IPs, enriching IP data, or analyzing geographic distribution.
Google Maps Grounding Lite MCP for location search, weather, and routes via mcporter.
Operate and troubleshoot BambuLab printers with the bambu-cli (status/watch, print start/pause/resume/stop, files, camera, gcode, AMS, calibration, motion, fans, light, config, doctor). Use when a user asks to control or monitor a BambuLab printer, set up profiles or access codes, or translate a task into safe bambu-cli commands with correct flags, output format, and confirmations.
Control Bambu Lab 3D printers locally via MQTT (no cloud). Supports A1, A1 Mini, P1P, P1S, X1C.
Generate 3D models from text or images. Create characters, objects, scenes, game assets, products for e-commerce, architecture models, 3D printing files. Aut...