Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/imadhsissou/python-arp-spoofer
A friendly command-line spoofing tool written in python using scapy and netifaces.
https://github.com/imadhsissou/python-arp-spoofer
Last synced: 2 months ago
JSON representation
A friendly command-line spoofing tool written in python using scapy and netifaces.
- Host: GitHub
- URL: https://github.com/imadhsissou/python-arp-spoofer
- Owner: imadhsissou
- License: mit
- Archived: true
- Created: 2016-08-09T17:59:16.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2020-07-19T03:08:43.000Z (over 4 years ago)
- Last Synced: 2024-11-13T13:11:54.470Z (3 months ago)
- Language: Python
- Homepage: https://pypi.python.org/pypi/pyarp
- Size: 47.9 KB
- Stars: 13
- Watchers: 4
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-network-stuff - **12**星 - line spoofing tool written in python using scapy and netifaces. (<a id="295e14c39bf33cd5136be8ced9383746"></a>工具 / <a id="f855508acfc870b1f0d90ff316f1dd75"></a>伪造&&Spoof)
README
## [NO LONGER MAINTAINED]
# Pyarp
Pyarp is a simple pen testing tool, written in python. It intercepts packets on a switched LAN by forging ARP replies. It comes with a line-oriented command interpreter, with autocomplete feature and commands history.
## Dependencies
```
# apt-get install python-dev
# apt-get install setuptools
# apt-get install python-pip
```## Installation
```
# pip install pyarp
```## Documentation
Type `help [command]` to display the information about a command, or check the [Manual](https://github.com/7BISSO/python-arp-spoofer/blob/master/pyarp/data/MANUAL.txt) for full documentation.
Notice : the beta version doesn't support IPv6 yet.
## Usage example
Set your network interface (press \ to list all network interfaces)
```
pyarp>> iface wlan0
pyarp>>
```
Scan for connected hosts on LAN
```
pyarp>> scan 192.168.1.0/24
Begin emission:
**Finished to send 256 packets.
...
Received 5 packets, got 2 answers, remaining 254 packetsinet 192.168.1.0/24
iface wlan0Host 1: MAC a4:7e:39:ab:fb:e0 IP 192.168.1.1
Host 2: MAC 00:0c:6e:da:49:ab IP 192.168.1.4
pyarp>>
```
Launch MITM attack (Ctrl + C to terminate)
```
pyarp>> spoof 192.168.1.1 192.168.1.4[+] Attack Launched.
.
Sent 1 packets.
.
Sent 1 packets.
^C
[+] Attack stopped, successful recover.pyarp>>
```## License
The contents of this repository is licensed under [MIT License](https://github.com/7BISSO/python-arp-spoofer/blob/master/LICENSE).