{"id":13474633,"url":"https://github.com/hatRiot/zarp","last_synced_at":"2025-03-26T21:32:04.063Z","repository":{"id":4684981,"uuid":"5831663","full_name":"hatRiot/zarp","owner":"hatRiot","description":"Network Attack Tool","archived":false,"fork":false,"pushed_at":"2023-05-01T20:18:05.000Z","size":935,"stargazers_count":1446,"open_issues_count":9,"forks_count":322,"subscribers_count":141,"default_branch":"master","last_synced_at":"2024-10-30T07:48:37.651Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/hatRiot.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2012-09-16T18:02:34.000Z","updated_at":"2024-10-30T01:40:07.000Z","dependencies_parsed_at":"2023-07-05T18:48:34.969Z","dependency_job_id":null,"html_url":"https://github.com/hatRiot/zarp","commit_stats":{"total_commits":269,"total_committers":12,"mean_commits":"22.416666666666668","dds":"0.12639405204460963","last_synced_commit":"5f19d83b45e3b6766844d5ffe7ef38122dc3fef6"},"previous_names":[],"tags_count":3,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hatRiot%2Fzarp","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hatRiot%2Fzarp/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hatRiot%2Fzarp/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/hatRiot%2Fzarp/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/hatRiot","download_url":"https://codeload.github.com/hatRiot/zarp/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245738798,"owners_count":20664345,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-31T16:01:13.722Z","updated_at":"2025-03-26T21:31:59.047Z","avatar_url":"https://github.com/hatRiot.png","language":"Python","readme":"Introduction\n==\n\nZarp is a network attack tool centered around the exploitation of local networks. This does not include system exploitation, but rather abusing networking protocols and stacks to take over, infiltrate, and knock out. Sessions can be managed to quickly poison and sniff multiple systems at once, dumping sensitive information automatically or to the attacker directly. Various sniffers are included to automatically parse usernames and passwords from various protocols, as well as view HTTP traffic and more. DoS attacks are included to knock out various systems and applications. These tools open up the possibility for very complex attack scenarios on live networks quickly, cleanly, and quietly.\n\nThe long-term goal of zarp is to become the master command center of a network; to provide a modular, well-defined framework that provides a powerful overview and in-depth analysis of an entire network.  This will come to light with the future inclusion of a web application front-end, which acts as the television screen, whereas the CLI interface will be the remote.  This will provide network topology reports, host relationships, and more.  zarp aims to be your window into the potential exploitability of a network and its hosts, not an exploitation platform itself; it is the manipulation of relationships and trust felt within local intranets.  Look for zeb, the web-app frontend to zarp, sometime in the future.\n\nCurrent version: 1.5 \nCurrent dev version: 1.6 \n\nInstallation\n==\nzarp is intended to be as dependency-free as possible.  When available, zarp has opted to use pure or native Python implementations over requiring or importing huge libraries.  Even as such, zarp requires the following to run:\n\n* Linux \n* Python 2.7.x \n* Scapy (packaged with zarp) \n\nIt is also recommended that user's have the following installed for access to specific modules:\n\n* airmon-ng suite (for all your wireless cracking needs)\n* tcpdump\n* libmproxy (packaged with zarp)\n* paramiko (SSH service)\n* nfqueue-bindings (packet modifier)\n\nThe recommended installation process is to run:\n\n```\ngit clone git://github.com/hatRiot/zarp.git\n\npip install -r requirements.txt\n```\n\nYou can then run:\n\n```\nsudo python zarp.py --update\n```\n\nto update zarp.  The update flag will not work if you download the tarball from the Git page.\n\nScapy comes packaged with Zarp and no installation is required. Wifite is used for wireless AP cracking; a specific version (ballast-dev branch) is required. This comes packaged with zarp. There are some dependencies required for Scapy, but most should be pretty easy to install or already be installed.\n\nTool Overview\n==\nBroad categories are (see wiki for more information on these):\n* Poisoners\n* Denial of Service\n* Sniffers\n* Scanners\n* Services\n* Parameter\n* Attacks\n\nCLI Usage and Shortcuts\n==\n```\n\u003e help\n\n  zarp options:\n    help            - This menu\n    opts            - Dump zarp current settings\n    exit            - Exit immediately\n    bg          - Put zarp to background\n    set [key] [value]   - Set key to value\n\n  zarp module options:\n    [int] [value]       - Set option [int] to value [value]\n    [int] o         - View options for setting\n    run (r)         - Run the selected module\n    info            - Display module information\n\n```\n\nModules can be navigated to by nesting entries:\n```\nbryan@debdev:~/tools/zarp$ sudo ./zarp.py \n[!] Loaded 34 modules.\n     ____   __   ____  ____\n    (__  ) / _\\ (  _ \\(  _ '\n     / _/ /    \\ )   / ) __/\n    (____)\\_/\\_/(__\\_)(__)  [Version: 0.1.5]\n\n    [1] Poisoners       [5] Parameter\n    [2] DoS Attacks     [6] Services \n    [3] Sniffers        [7] Attacks  \n    [4] Scanners        [8] Sessions \n\n0) Back\n\u003e 6 2\n    +-----+----------------+----------------------------+------+----------+-\n    |     | Option         | Value                      | Type | Required | \n    +-----+----------------+----------------------------+------+----------+-\n    | [1] | Displayed MOTD | b4ll4stS3c FTP Server v1.4 | str  | False    | \n    +-----+----------------+----------------------------+------+----------+-\n    | [2] | Listen port    | 21                         | int  | False    | \n    +-----+----------------+----------------------------+------+----------+-\n0) Back\nFTP Server \u003e \n```\nNested entries go as far as modules will.  Note that right now it's 'dumb' in that, if you enter in a ton of numbers, it's going to continue dumping that out as module selection!\n\nUsage Examples\n==\nList of modules accessible from the command line:\n```\nbryan@debdev:~/tools/zarp$ sudo ./zarp.py --help\n[!] Loaded 34 modules.\n     ____   __   ____  ____\n    (__  ) / _\\ (  _ \\(  _ '\n     / _/ /    \\ )   / ) __/\n    (____)\\_/\\_/(__\\_)(__)  [Version: 0.1.5]\n\nusage: zarp.py [-h] [-q FILTER] [--update] [--wap] [--ftp] [--http] [--smb]\n               [--ssh] [--telnet] [-w] [-s] [--service-scan]\n\noptional arguments:\n  -h, --help      show this help message and exit\n  -q FILTER       Generic network sniff\n  --update        Update Zarp\n\nServices:\n  --wap           Wireless access point\n  --ftp           FTP server\n  --http          HTTP Server\n  --smb           SMB Service\n  --ssh           SSH Server\n  --telnet        Telnet server\n\nScanners:\n  -w              Wireless AP Scan\n  -s              Network scanner\n  --service-scan  Service scanner\nbryan@debdev:~/tools/zarp$ \n```\n\nMain menu when launched with the command line GUI:\n```\nbryan@devbox:~/zarp$ sudo ./zarp.py\n[!] Loaded 33 modules.\n     ____   __   ____  ____\n    (__  ) / _\\ (  _ \\(  _ '\n     / _/ /    \\ )   / ) __/\n    (____)\\_/\\_/(__\\_)(__)\n        [Version 0.1.4]         \n    [1] Poisoners       [5] Parameter\n    [2] DoS Attacks     [6] Services \n    [3] Sniffers        [7] Attacks  \n    [4] Scanners        [8] Sessions \n\n0) Back\n\u003e \n```\n\nNavigating a module is pretty simple, and there are really only a few commands to know.  When in the context of a module, the command 'info' can be used to dump a help or informational string:\n```\nARP Spoof \u003e info\n--------------------------------------------------------- \nThe heart and soul of zarp.  This module exploits the ARP\nprotocol to redirect all traffic through the attacker's \nchosen system. \n\nhttp://en.wikipedia.org/wiki/ARP_poison\n---------------------------------------------------------\n    +-----+------------------------------------+-------+------+----------+-\n    |     | Option                             | Value | Type | Required | \n    +-----+------------------------------------+-------+------+----------+-\n    | [1] | Interval to send respoofed packets | 2     | int  | False    | \n    +-----+------------------------------------+-------+------+----------+-\n    | [2] | Address to spoof from target       | None  | ip   | True     | \n    +-----+------------------------------------+-------+------+----------+-\n    | [3] | Target to poison                   | None  | ip   | True     | \n    +-----+------------------------------------+-------+------+----------+-\n0) Back\nARP Spoof \u003e \n```\n\nTo set an option, give it the option number followed by the value:\n```\nARP Spoof \u003e 2 192.168.1.219\n```\n\nIf an option supports a choice list, give it the option number followed by the lowercase letter o:\n```\nHTTP Sniffer \u003e 2 o\n[!] Options: ['Site Only', 'Request String', 'Request and Payload', 'Session IDs', 'Custom Regex']\n    +-----+-----------------------------+--------------+-------+----------+-\n    |     | Option                      | Value        | Type  | Required | \n    +-----+-----------------------------+--------------+-------+----------+-\n    | [1] | Regex for level 5 verbosity | None         | regex | False    | \n    +-----+-----------------------------+--------------+-------+----------+-\n    | [2] | Output verbosity            | 1            | int   | False    | \n    +-----+-----------------------------+--------------+-------+----------+-\n    | [3] | Address to sniff from       | 192.168.1.97 | ip    | False    | \n    +-----+-----------------------------+--------------+-------+----------+-\n0) Back\nHTTP Sniffer \u003e \n```\n\nModules, once all required options are set, can be run by specifying a lowercase '''r'''.\n\nFuture/Current Development\n==\n\nMoved to freedcamp; please send me an email if you'd like to contribute.\n","funding_links":[],"categories":["Uncategorized","Tools","Python","Network Tools","Network","Awesome Penetration Testing (\"https://github.com/Muhammd/Awesome-Pentest\")"],"sub_categories":["Uncategorized","Network Tools","Intentionally Vulnerable Systems as Docker Containers","Forensics","Docker Containers of Penetration Testing Distributions and Tools","Tools"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FhatRiot%2Fzarp","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FhatRiot%2Fzarp","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FhatRiot%2Fzarp/lists"}