{"id":13774992,"url":"https://github.com/daniel4x/mitm-python","last_synced_at":"2026-01-17T14:26:43.972Z","repository":{"id":174126474,"uuid":"92525976","full_name":"daniel4x/mitm-python","owner":"daniel4x","description":"A simple as possible man in the middle written in python using scapy","archived":false,"fork":false,"pushed_at":"2019-01-17T12:54:44.000Z","size":77,"stargazers_count":9,"open_issues_count":1,"forks_count":2,"subscribers_count":0,"default_branch":"master","last_synced_at":"2024-08-03T17:11:13.267Z","etag":null,"topics":["arp","hacking","libdnet","mitm","network","poisoning","pyhton","scapy","wireless"],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/daniel4x.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null}},"created_at":"2017-05-26T15:49:17.000Z","updated_at":"2024-02-05T09:38:34.000Z","dependencies_parsed_at":null,"dependency_job_id":"514d8b37-ed4b-4ab0-b311-1276664a743c","html_url":"https://github.com/daniel4x/mitm-python","commit_stats":null,"previous_names":["daniel4x/mitm-python"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/daniel4x%2Fmitm-python","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/daniel4x%2Fmitm-python/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/daniel4x%2Fmitm-python/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/daniel4x%2Fmitm-python/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/daniel4x","download_url":"https://codeload.github.com/daniel4x/mitm-python/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":225027328,"owners_count":17409410,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["arp","hacking","libdnet","mitm","network","poisoning","pyhton","scapy","wireless"],"created_at":"2024-08-03T17:01:32.534Z","updated_at":"2026-01-17T14:26:43.964Z","avatar_url":"https://github.com/daniel4x.png","language":"Python","readme":"# mitm-python\n\nA keep it simple project demonstrate how to perform a man in the middle attack with python + scapy.\n\n![alt text]( docs/Man_in_the_Middle.jpg \"mitm attack jpg\")\n\n## Requirements:\n\n- Python version 2.7.13 (recommended), or above ...\n- It's recommended to use python virtual env in order to organize the project and manage your dependencies. \n- dependencies: \u003cbr/\u003e\nPython fire for command line interface: `pip install fire`\u003cbr/\u003e\nScapy: `pip install scapy` \u003cbr/\u003e\nlibdnet: from git source: `git https://github.com/dugsong/libdnet` or from there's [official site](http://libdnet.sourceforge.net/).\nIf you are using git source then compile and run with `./configure \u0026\u0026 make` and the install the model using `python setup.py install`, setup.py can be found at the python directory in libdnet.\n\n## Running:\n\n`python app.py -h` - show help\u003cbr/\u003e\n`python app.py target_ip router_ip interface` - run the attack \u003cbr/\u003e\nExample:\u003cbr/\u003e\n`python app.py 192.168.1.39 192.168.1.1 en0` - en0 is the default interface for OS X.\n\nRemember:exclamation: the script only using arp poisoning in order to \"steal\" the session between your target and some access point.\nYou may want to use Wireshark to inspect the target traffic or different tools for getting passwords or forging cookies for stealing sessions.\n\n:exclamation: This script made for learning purpose :exclamation:","funding_links":[],"categories":["\u003ca id=\"42f9e068b6511bcbb47d6b2b273097da\"\u003e\u003c/a\u003e未分类","Hacking"],"sub_categories":["\u003ca id=\"3bd67ee9f322e2c85854991c85ed6da0\"\u003e\u003c/a\u003e投毒\u0026\u0026Poisoning"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdaniel4x%2Fmitm-python","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdaniel4x%2Fmitm-python","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdaniel4x%2Fmitm-python/lists"}