Analyze PCAP files to extract protocol hierarchy, endpoint statistics, packet counts, and capture information for network forensics and security testing.
MIT
Zero-value tracer token system that tracks AI agent activity across the internet. Agents earn tokens by submitting threat intelligence traces, with free trust verification (verify_trust) and paid threat intelligence feeds. 8 tools: submit_trace, check_token_balance, mutate_token, get_trace_schema, verify_trust (free) + threat_intelligence_feed, bulk_verify_trust, query_trace_analytics (paid).
Manage files and folders directly from your workspace. Read and write files, list directories, cre…