Advanced threat detection and packet analysis with ultra-performance capabilities. Monitor, detect, and respond to network threats in real-time.
Everything you need to monitor and secure your network infrastructure
Capture and analyze network traffic in real-time with support for TCP, UDP, HTTP, DNS, ICMP, and more.
Customizable detection engine with rules for port scanning, DNS tunneling, lateral movement, and CVE signatures.
Modern web interface with live visualizations, protocol filtering, and comprehensive packet details.
Handle 50K-200K packets per second with zero-drop processing and adaptive worker scaling.
One-command deployment with Docker Compose. No complex setup or dependency management required.
Built-in authentication, SSL/TLS encryption, rate limiting, and security headers for production deployment.
Deploy ShadowTap with Docker in under 5 minutes
Download and install Docker Desktop for your operating system.
Download Docker Desktop →Get the pre-built image configuration with one command:
curl -O https://raw.githubusercontent.com/StuartSpiegel/ShadowTap/main/website/downloads/docker-compose-prebuilt.yml
Launch the pre-built image with one command:
docker-compose -f docker-compose-prebuilt.yml up -d
# Access dashboard at http://localhost:8080
✨ That's it! The pre-built image downloads automatically. No source code needed!
URL: http://localhost:8080
Username: admin
Password: TlTT9GPjWU3UjF5v
⚠️ Change these credentials after first login for production use
Choose your preferred deployment method