Network & Process Monitor Tool

2025-01-20 05:44:32.8166667
Log All Network Ips And Code Executed On Your PC
Github Link

In today’s cyber-threat landscape, real-time monitoring of your machines activity is essential. This powerful cybersecurity tool tracks incoming and outgoing IP connections, monitors running processes, and logs system activity, providing full visibility to prevent malicious intrusions.

Key Features:

.NET SharpPcap

Our platform integrates SharpPcap, a powerful .NET library for packet capturing and network analysis. SharpPcap enables developers to interact with live network traffic and offline PCAP files, providing flexibility in building custom monitoring and forensic tools. By leveraging this robust framework, we can efficiently process and analyze network packets, extract valuable insights, and automate security detection mechanisms. Whether it's real-time traffic interception or deep packet inspection from stored data, SharpPcap enhances our ability to maintain visibility and ensure network integrity.

Database Structure for Monitoring

Process Monitoring Database Example

Process NameSignaturesStart InfoParent ProcessFiles List
ExampleProcess.exeSigned/UnsignedStartup ParametersParentProcess.exeFile1.dll, File2.dll

Network Monitoring Database Example

IP AddressIP VersionDomainsGeolocationProtocolsPortsThreat Status
192.168.1.1IPv4example.comCountry, CityTCP, UDP443, 80Safe/Suspicious

Network Traffic Storage and Offline Analysis

With our approach, network packets are meticulously recorded and securely stored for later examination. This process allows for in-depth packet capture (PCAP) analysis using industry-standard tools such as Wireshark, tcpdump, and other forensic analysis solutions. Whether troubleshooting connectivity issues, identifying malicious activities, or auditing system logs, our robust storage ensures complete visibility into network traffic history.

Offline analysis provides the flexibility to investigate incidents without requiring real-time monitoring. This is especially crucial for forensic investigations, compliance audits, and cybersecurity assessments. By leveraging stored data, analysts can uncover trends, pinpoint network vulnerabilities, and make informed decisions to enhance network resilience.

Open-Source & Available on GitHub

This project is open-source and designed for educational purposes. Developers, cybersecurity researchers, and IT professionals can access and modify the code to enhance security features.

Why Make a Tool Like This Yourself?

Set Up

To set up the project, start by installing the Microsoft OLE DB Driver for SQL Server and an instance of SQL Express. Next, create a new database and run the two schema scripts (ByIp and ByProcessName). Don't forget to change the connection string. Then, install WinPcap, ensure you run the application as an administrator, and build the project for x64 architecture. Finally, add geolocation API key by visiting api.ipdata.co and creating an account.

Examples

Location Information

The following text shows the data received from a geolocation API:

Process Startup Information

The following command shows the parameters program azuredatastudio.exe was started with:

C:\********\********\Local\Programs\Azure Data Studio\azuredatastudio.exe
--type=utility --utility-sub-type=node.mojom.NodeService --lang=en-US
--service-sandbox-type=none
--user-data-dir="C:\********\********\Roaming\azuredatastudio"
--standard-schemes=vscode-webview,vscode-file
--secure-schemes=vscode-webview,vscode-file
--cors-schemes=vscode-webview,vscode-file
--fetch-schemes=vscode-webview,vscode-file
--service-worker-schemes=vscode-webview
--code-cache-schemes=vscode-webview,vscode-file
--field-trial-handle=3484,i,9570833253488652578,2633411548557227761,262144
--enable-features=kWebSQLAccess
--disable-features=CalculateNativeWinOcclusion,SpareRendererForSitePerProcess,
WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand
--variations-seed-version
--mojo-platform-channel-handle=3472 /prefetch:8
	

DLL File Signature

The following text shows the signature details for a DLL file:

Files Running Alongside a Process

The following text shows files, and file sections, program C:\Windows\System32.exe has executed:

HTTP Packet Information

The following text shows the structure of an HTTP packet:

Raw Data

The following text shows Raw SSL encrypted IP packet data: