{"id":13647308,"url":"https://github.com/EONRaider/Packet-Sniffer","last_synced_at":"2025-04-22T02:31:14.839Z","repository":{"id":37034443,"uuid":"313745578","full_name":"EONRaider/Packet-Sniffer","owner":"EONRaider","description":"A Network Packet Sniffing tool developed in Python 3.","archived":false,"fork":false,"pushed_at":"2024-08-29T19:01:31.000Z","size":15780,"stargazers_count":737,"open_issues_count":0,"forks_count":97,"subscribers_count":23,"default_branch":"master","last_synced_at":"2024-11-09T17:45:03.586Z","etag":null,"topics":["ethical-hacking","network-programming","packet-sniffer","pentesting-tools","tcp-ip"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"agpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/EONRaider.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null}},"created_at":"2020-11-17T21:18:53.000Z","updated_at":"2024-10-14T03:06:36.000Z","dependencies_parsed_at":"2024-01-14T10:03:24.122Z","dependency_job_id":"da3e0b39-228e-40e9-ab64-e9eab0532da0","html_url":"https://github.com/EONRaider/Packet-Sniffer","commit_stats":{"total_commits":115,"total_committers":5,"mean_commits":23.0,"dds":0.07826086956521738,"last_synced_commit":"be7f706c0d782d6458610b80a127910a82f5f03d"},"previous_names":[],"tags_count":10,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EONRaider%2FPacket-Sniffer","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EONRaider%2FPacket-Sniffer/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EONRaider%2FPacket-Sniffer/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EONRaider%2FPacket-Sniffer/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/EONRaider","download_url":"https://codeload.github.com/EONRaider/Packet-Sniffer/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":223887532,"owners_count":17219944,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["ethical-hacking","network-programming","packet-sniffer","pentesting-tools","tcp-ip"],"created_at":"2024-08-02T01:03:29.046Z","updated_at":"2024-11-09T21:30:27.980Z","avatar_url":"https://github.com/EONRaider.png","language":"Python","readme":"# Python 3 Network Packet Sniffer\n\n![Python Version](https://img.shields.io/badge/python-3.8+-blue?style=for-the-badge\u0026logo=python)\n![OS](https://img.shields.io/badge/OS-GNU%2FLinux-red?style=for-the-badge\u0026logo=linux)\n[![CodeFactor Grade](https://img.shields.io/codefactor/grade/github/EONRaider/Packet-Sniffer?label=CodeFactor\u0026logo=codefactor\u0026style=for-the-badge)](https://www.codefactor.io/repository/github/eonraider/packet-sniffer)\n[![License](https://img.shields.io/github/license/EONRaider/Packet-Sniffer?style=for-the-badge)](https://github.com/EONRaider/Packet-Sniffer/blob/master/LICENSE)\n\n[![Reddit](https://img.shields.io/badge/Reddit-EONRaider-FF4500?style=flat-square\u0026logo=reddit)](https://www.reddit.com/user/eonraider)\n[![Discord](https://img.shields.io/badge/Discord-EONRaider-7289DA?style=flat-square\u0026logo=discord)](https://discord.gg/KVjWBptv)\n[![Twitter](https://img.shields.io/badge/Twitter-eon__raider-38A1F3?style=flat-square\u0026logo=twitter)](https://twitter.com/intent/follow?screen_name=eon_raider)\n\nA Network Packet Sniffer developed in Python 3. Packets are disassembled\nas they arrive at a given network interface controller and their information\nis displayed on the screen.\n\nThis application depends exclusively on the [NETProtocols](https://github.com/EONRaider/NETProtocols) \nlibrary (also developed and maintained by [EONRaider](https://github.com/EONRaider)) \nfrom version 2.0.0 and above and can be run by any Python 3.8+ interpreter.\n\n## Demo\n![sniffer_demo](https://user-images.githubusercontent.com/15611424/178045423-067df4ec-1853-400e-9b5a-10154cb6fcc1.gif)\n\n## Running the Application\n### I. Development Mode\nSimply clone this repository with `git clone`, install the dependencies and execute the \n`sniffer.py` file.\n```\nuser@host:~$ git clone https://github.com/EONRaider/Packet-Sniffer.git\nuser@host:~$ cd Packet-Sniffer\nuser@host:~/packet-sniffer$ pip install -r requirements.txt \u003c--or--\u003e poetry install\nuser@host:~/packet-sniffer$ sudo python3 packet_sniffer/sniffer.py\n```\n\n*The `sudo` command is required due to the use of `socket.SOCK_RAW`,\nwhich needs administrative privileges to run on GNU/Linux. Notice\nthat the existence of dependencies may require the execution of the interpreter contained in\nthe virtual environment in which the dependencies have been installed (if you use one),\ninstead of just using the system interpreter.*\n\n### II. (Optional) Build the binary\nUse the `build.py` file to compile your own binary with the `PyInstaller` package. You just need to install all dependencies and build. \nDependency management works with both [Poetry](https://python-poetry.org/) (recommended) and [Virtualenv](https://virtualenv.pypa.io/en/latest/). \n```\n\u003c-- Install dependencies as shown above in Step I --\u003e\nuser@host:~/packet-sniffer$ python3 build.py\n```\n\n## Usage\n```\nsniffer.py [-h] [-i INTERFACE] [-d]\n\nNetwork Packet Sniffer\n\noptional arguments:\n  -h, --help            show this help message and exit\n  -i INTERFACE, --interface INTERFACE\n                        Interface from which packets will be captured (monitors\n                        all available interfaces by default).\n  -d, --data            Output packet data during capture.\n```\n\n## Legal Disclaimer\nThe use of code contained in this repository, either in part or in its totality,\nfor engaging targets without prior mutual consent is illegal. **It is\nthe end user's responsibility to obey all applicable local, state and\nfederal laws.**\n\nDevelopers assume **no liability** and are not\nresponsible for misuses or damages caused by any code contained\nin this repository in any event that, accidentally or otherwise, it comes to\nbe utilized by a threat agent or unauthorized entity as a means to compromise\nthe security, privacy, confidentiality, integrity, and/or availability of\nsystems and their associated resources. In this context the term \"compromise\" is\nhenceforth understood as the leverage of exploitation of known or unknown vulnerabilities\npresent in said systems, including, but not limited to, the implementation of\nsecurity controls, human- or electronically-enabled.\n\nThe use of this code is **only** endorsed by the developers in those\ncircumstances directly related to **educational environments** or\n**authorized penetration testing engagements** whose declared purpose is that\nof finding and mitigating vulnerabilities in systems, limiting their exposure\nto compromises and exploits employed by malicious agents as defined in their\nrespective threat models.\n","funding_links":[],"categories":["Python"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FEONRaider%2FPacket-Sniffer","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FEONRaider%2FPacket-Sniffer","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FEONRaider%2FPacket-Sniffer/lists"}