WinPcap is designed to capture/transmit packets specifically by network protocol bypassing.
It will provide you with direct packet access including the ability to create a separate connection to raw network data for network/protocol analyzers, network monitors/scanners, traffic loggers and generators as well as user-level bridges and routers. It can also be used in conjunction with network intrusion detection systems like Suricata or other types of security tools.
A majority of networking applications access the network via widely used operating system options like sockets for instance. These type of options allow an easy way to access network data. But, sometimes, the so-called 'easy way' is not up to the task at hand. This deficiency is due to some applications requiring direct access to packets on the network. Meaning, they need access to the "raw" data on the network without the need for protocol processing by the operating system. This ability is where WinPcap comes into play as it will provide this type of access to Win32 applications; it offers facilities to:
capture raw packets, both the ones destined to the machine where it's running and the ones exchanged by other hosts (on shared media)
filter the packets according to user-specified rules before forwarding them to the application
transmit raw packets to the network
gather statistical information on the network traffic