|
A deterministic, offline-first packet analysis engine written in Rust. Built for environments where cloud tools aren't an option. Air-gap safe. Zero cloud. Zero network calls. |
What it detects — fully offline: 🛡️ JA3/JA4 TLS fingerprinting Same PCAP → SHA-256 identical output. Always. |
| Phase | Feature | Status |
|---|---|---|
| ✅ 19 | Offline Threat Intel — IOC matching, JA3/JA4 threat actor attribution | DONE |
| 🔨 20 | PCAP Redaction Engine — anonymize IPs/MACs for safe PCAP sharing | IN PROGRESS |
| 📋 21 | Hardware Fingerprinting — passive OS/device detection from TTL, TCP window | PLANNED |
| 📋 22 | Multi-PCAP Correlation — track persistent threat actors across captures | PLANNED |
| 📋 23 | Query Extension — show flows where bytes > 1MB on stored sessions |
PLANNED |
| 📋 24 | SIEM Export — Splunk/Elastic/CEF file-based export | PLANNED |
Core: Rust · pcap · etherparse · md5 · sha2 · serde
Domains: Network forensics · Threat intelligence · ICS/SCADA security · TLS fingerprinting
Platforms: RHEL 9 · Windows 11 · Cross-platform deterministic builds
Building the commercial edition of SNF — advanced threat detection, behavioral analysis, graph engine, timeline reconstruction, and SIEM integration. Open core model: SNF-Core is free forever. Pro edition coming soon.
If you work in network security, DFIR, or ICS/OT — SNF-Core might be useful to you.
Star the repo if it is ⭐