floodprint.web
pcap → ddos signature regex · for arbor / suricata / tms payload filters
awaiting pcap

Drop a pcap of DDoS traffic; get back a PCRE-style escape-string regex matching the attack pattern. Packets are not parsed by protocol — each frame is treated as an opaque byte sequence from offset zero. The tool runs position-by-position byte frequency analysis for fixed-offset structure, plus a global floating-substring pass that finds byte sequences recurring across frames at any offset — essential for catching things like DNS water torture where the target domain shifts position per packet because each query has a different random subdomain prefix.

Five regexes are generated, one each for 50% / 60% / 70% / 80% / 90% packet-coverage targets — slide between them. Lower coverage = more specific regex (lots of literals, matches the cleanest cohort); higher coverage = looser regex (more wildcards, catches stragglers and variants). The example packet below each regex shows exactly which bytes are literal-matched and which fall into a wildcard.

runs entirely in your browser — your pcap is never uploaded anywhere

drop a .pcap or .pcapng file here
or click to choose · ethernet / raw ip / sll · ipv4+ipv6 · any l4