{"id":17988243,"url":"https://github.com/sighook/layer234-attack-tools","last_synced_at":"2025-03-25T22:33:23.527Z","repository":{"id":48432525,"uuid":"298804138","full_name":"sighook/layer234-attack-tools","owner":"sighook","description":"Set of tools and helpers for attacks on the 2, 3 and 4 layers of the OSI Model.","archived":false,"fork":false,"pushed_at":"2022-07-22T22:48:17.000Z","size":73,"stargazers_count":7,"open_issues_count":0,"forks_count":2,"subscribers_count":2,"default_branch":"master","last_synced_at":"2025-03-20T21:44:33.002Z","etag":null,"topics":["attacking","layer2","layer3","layer4"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/sighook.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2020-09-26T11:56:21.000Z","updated_at":"2024-04-13T16:24:28.000Z","dependencies_parsed_at":"2022-08-24T05:30:18.802Z","dependency_job_id":null,"html_url":"https://github.com/sighook/layer234-attack-tools","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sighook%2Flayer234-attack-tools","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sighook%2Flayer234-attack-tools/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sighook%2Flayer234-attack-tools/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sighook%2Flayer234-attack-tools/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/sighook","download_url":"https://codeload.github.com/sighook/layer234-attack-tools/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245555963,"owners_count":20634830,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["attacking","layer2","layer3","layer4"],"created_at":"2024-10-29T19:11:07.311Z","updated_at":"2025-03-25T22:33:23.266Z","avatar_url":"https://github.com/sighook.png","language":"Python","readme":"Layer 2/3/4 attack tools\n========================\n\n## Description:\n\nSet of tools and helpers for attacks on the 2, 3 and 4 layers of the OSI Model.\nSome of them I adapted from the Net, some I wrote myself, some by [volgk](https://github.com/volgk).\n\nEnjoy.\n\n| Name                   | Description                                                                        |\n| ---------------------- | ---------------------------------------------------------------------------------- |\n| arp_mac_spoof.py       | Perform CAM overflow attack on Layer2 switches.                                    |\n| arp_spoof_flood.py     | Spoof ARP reply.                                                                   |\n| dhcp_spoof_shock.py    | Spoof a DHCP server and exploit all clients vulnerable to the 'ShellSock' attacks. |\n| gateway_finder.py      | Identify routers on the local LAN and paths to the Net.                            |\n| icmp_spoof_reply.py    | ICMP spoof reply.                                                                  |\n| mac2manuf.pl           | Find the manufacturer by MAC address.                                              |\n| magpie.sh              | Find LEAP/MSCHAPv2/PPP/PPTP/RADIUS sensitive data in pcap files.                   |\n| netxml_dump.pl         | Dump aircrack's netxml output in pretty format.                                    |\n| traceroute_geoloc.sh   | Traceroute to host with geolocation info.                                          |\n\n## Dependencies:\n\n- aircrack-ng\n- nmap\n- perl and XML::Simple module\n- scapy\n- wireshark (tshark)\n\n## See also\n\n- [yersinia](https://github.com/tomac/yersinia) - Framework for layer 2 attacks.\n- [layer567-attack-tools](https://github.com/chinarulezzz/layer567-attack-tools) - Layer 5, 6 and 7 attack tools.\n\n\u003c!-- End of file. --\u003e\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsighook%2Flayer234-attack-tools","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fsighook%2Flayer234-attack-tools","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsighook%2Flayer234-attack-tools/lists"}