๐Ÿ“ฆ cyrozap / agilent-pcie-analyzer-re

Notes and utilities for reverse engineering Agilent PCIe Protocol Analyzers and their host software.

โ˜… 13 stars โ‘‚ 1 forks ๐Ÿ‘ 13 watching โš–๏ธ GNU General Public License v3.0
๐Ÿ“ฅ Clone https://github.com/cyrozap/agilent-pcie-analyzer-re.git
HTTPS git clone https://github.com/cyrozap/agilent-pcie-analyzer-re.git
SSH git clone git@github.com:cyrozap/agilent-pcie-analyzer-re.git
CLI gh repo clone cyrozap/agilent-pcie-analyzer-re
cyrozap cyrozap Enable display of PCIe endpoint and memory addresses in NetTLP captures 0153bfd 3 months ago ๐Ÿ“ History
๐Ÿ“‚ master View all commits โ†’
๐Ÿ“ doc
๐Ÿ“ pad-files
๐Ÿ“ tools
๐Ÿ“ wireshark
๐Ÿ“„ COPYING.txt
๐Ÿ“„ README.md
๐Ÿ“„ README.md

Agilent PCIe Protocol Analyzer Reverse Engineering

Reverse engineering the N5305A/N5306A family of PCIe protocol analyzers and their host software.

Repository contents

file for the Agilent PAD file format.
  • pad-files: Sample PCIe capture files in Agilent PAD (Protocol
Analyzer Data) format. converting Agilent PAD PCIe capture files to PCAP-NG. The PCAP-NG files generated by the pad2pcapng tool can be dissected in Wireshark using the PCIe dissector. capture files. This tool is much slower than the Rust version, and will not be developed further.
  • wireshark: A Wireshark dissector that can parse PCAP-NG files
containing PCIe capture data.

Related projects

  • Nox: A set of FOSS tools, utilities, and libraries for PCI-Express
analyzers.

License

Except where otherwise noted:

  • All software in this repository is made available under the
GNU General Public License, version 3 or later.
  • All copyrightable content that is not software (e.g., reverse engineering
notes, this README file, etc.) is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License.