RETRO//CAPTURE
NETWORK PACKET SNIFFER
RETRO//CAPTURE
PID Process Connections Protocol Targets
12045 chrome.exe 12 TCP · UDP edgedl.google.com + 4 more
8923 game.exe 8 TCP 203.0.113.45:5555
3421 discord.exe 4 TCP gateway.discord.gg
7788 steam.exe 2 TCP steamcommunity.com
What do you want to do?
💾
Capture Only
Save traffic as .pcap file
🔗
Capture + Chain
Auto-create protocol chain
🚀
Quick Test
Capture, build chain, launch test — all in one
Capturing game.exe
packets · / 10s
01 / 03
CAPTURE
Pick any process. Quick Test mode does it all in one click — capture, build chain, launch.
RETRO//CAPTURE
Uploading to RETRO//STRESS
Parsing packets and building chain...
Chain created
Name game.exe capture
Steps
Summary TCP handshake + TLS 1.3 + HTTP/2
TCP TLS 1.3 HTTP/2
02 / 03
BUILD
Auto-build a replayable protocol chain from real captured traffic.
RETRO//CAPTURE
Launch test
Target
Port
Duration
Concurrent
Test launched
Target 203.0.113.45:5555
Duration 30s
Concurrent 5

View your test in the RETRO//STRESS panel.

test #1
test #2
test #3
test #4
test #5
03 / 03
DEPLOY
Launch distributed stress tests at any scale, from anywhere.
GET STARTED AT
retrostress.net