Start free — no card required. Upgrade when your captures demand it.
Compare tiers side by side
| Feature | Free | Pro | Technical Forensics |
|---|---|---|---|
| File size limit | 2MB | 5MB | 5MB |
| AI threat summary | Teaser | Full | Full |
| Export PDF report | ✗ | Standard | Advanced |
| Protocol breakdown | ✓ | ✓ | ✓ |
| Top flows (IP pairs) | ✓ | ✓ | ✓ |
| Port analysis | ✗ | ✓ | ✓ |
| TLS SNI inspection | ✗ | ✓ | ✓ |
| DNS query analysis | ✗ | ✓ | ✓ |
| .pcapng support | ✗ | ✓ | ✓ |
| Deep Packet Inspection | ✗ | ✗ | ✓ |
| SQLi / XSS detection | ✗ | ✗ | ✓ |
| Credential leak detection | ✗ | ✗ | ✓ |
| Telnet session reconstruction | ✗ | ✗ | ✓ |
| WiFi / WPA analysis | ✗ | ✗ | ✓ |
| HTTP host & UA analysis | ✗ | ✗ | ✓ |
Billing handled by Polar. Authentication by Clerk.