I built NimPacket because I kept running into networking libraries that hide the low-level details I actually needed for my cybersecurity work. I wanted to understand what is happening inside IPv4, TCP, UDP, and ICMP packets at the byte level, so I decided to write my own small packet library in Nim. It lets me create headers, combine layers, serialize them into raw bytes, and parse real traffic back into readable structures.
This project feels strong for a masters course because it is not just another script that calls existing tools. It shows that I can work directly with protocol fields, binary layouts, bit flags, checksums, and proper endianness. These are things most students only read about, but building them by hand forces you to understand how the protocols actually function. I also included working examples like a basic SYN scanner, an ICMP echo builder, and a raw packet sniffer, so the code has practical use for real security testing.
I am proud of this project because it pushed me to think at a deeper level than the usual Python networking assignments. It reflects real understanding instead of surface level output. If anyone reviewing this wants to give honest feedback or even grade the depth and quality of the work, I would genuinely appreciate it.