PA-Toolkit | Pentester Academy Wireshark Toolkit

PA Toolkit is a collection of traffic analysis plugins to extend the functionality of Wireshark from a micro-analysis tool and protocol dissector to the macro analyzer and threat hunter. PA Toolkit contains plugins (both dissectors and taps) covering various scenarios for multiple protocols, including:

  • WiFi (WiFi network summary, Detecting beacon, deauth floods etc.)
  • HTTP (Listing all visited websites, downloaded files)
  • HTTPS (Listing all websites opened on HTTPS)
  • ARP (MAC-IP table, Detect MAC spoofing and ARP poisoning)
  • DNS (Listing DNS servers used and DNS resolution, Detecting DNS Tunnels)

The project is under active development and more plugins will be added in near future.

This material was created while working on “Traffic Analysis: TSHARK Unleashed” course. Those interested can check the course here:

Terms of Use

  • This is licensed under GPL just as Wireshark.



  1. Copy the “plugins” directory to Wireshark plugins directory.
  2. Start wireshark. :)

One can get the location of wireshark plugins directory by checking Help > About Wireshark > Folders

Please opt for Personal Plugins directory and NOT the Global Plugins directory.

If you prefer Global Plugins directory, then please use this branch:

Special note for Macbook users: Paste the plugins in Personal Lua plugins and not in Personal Plugins.

Compatibility: Current version is NOT compatible with Wireshark v2.9. Support request pending:

Sister Project

VoIPShark (


Under the guidance of Mr. Vivek Ramachandran, CEO, Pentester Academy


For more details refer to the “PA-Toolkit.pdf” PDF file. This file contains the slide deck used for presentations.


PA Toolkit after installation

List of websites visited over HTTP

Search functionality

Domain to IP mappings


This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License v2 as published by the Free Software Foundation.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see

Share this post


Welcome to my personal blog to share my knowledge
Cyber Security, Ethical Hacking, Web & Network Auditing, Reverse Engineering and Cryptography
This website don't use analytics tracking and is ads-free. JavaScript is enabled .


Contact Form : Connect with Us

    Ricochet : ricochet:3ka6l4q255cakeirgxupsl5i4lw3qpk5gmngtv5amax64hckuovgozyd

2023 © 0x1 | Cyber Security Consulting - Copyright All Rights Reserved