Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/rundtstykker/arp-spoof
A python 2.7 program written to manipulate protocols on layer 2 of OSI model. It effectively places you as MITM in connection.
https://github.com/rundtstykker/arp-spoof
arp-spoofing layer2 mitm python
Last synced: 5 days ago
JSON representation
A python 2.7 program written to manipulate protocols on layer 2 of OSI model. It effectively places you as MITM in connection.
- Host: GitHub
- URL: https://github.com/rundtstykker/arp-spoof
- Owner: rundtstykker
- License: bsd-2-clause
- Created: 2020-09-30T15:36:15.000Z (about 4 years ago)
- Default Branch: master
- Last Pushed: 2020-09-30T15:45:36.000Z (about 4 years ago)
- Last Synced: 2024-09-24T19:23:18.031Z (about 2 months ago)
- Topics: arp-spoofing, layer2, mitm, python
- Language: Python
- Homepage:
- Size: 5.86 KB
- Stars: 4
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# arp-spoof
A python 2.7 program written to manipulate protocols on layer 2 of OSI model. It effectively places you as MITM in connection.## Getting Started
To run this program, you should already be in the network (wireless or wired). This program effectively updates the ARP tables on both the router and the target.## Running the program
Written in python 2.7, make sure to use the appropriate interrupter. You should know the IPs of router and target. Do an Nmap scan if unknown.## Example usage
python ARP_spoof.py --ip 192.168.0.10 --router 192.168.0.1 --victim 192.168.0.10## Attention
Please do not use this program where unauthorized.## Credits
| | |
| ------------------------------------ | ----------- |
| **Author** | @bryanwei |## License
See the [LICENSE](https://github.com/bryanweielio/arp-spoof/blob/master/LICENSE) file.