https://github.com/rundtstykker/arp-spoof
A python 2.7 program written to manipulate protocols on layer 2 of OSI model. It effectively places you as MITM in connection.
https://github.com/rundtstykker/arp-spoof
arp-spoofing layer2 mitm python
Last synced: 9 months ago
JSON representation
A python 2.7 program written to manipulate protocols on layer 2 of OSI model. It effectively places you as MITM in connection.
- Host: GitHub
- URL: https://github.com/rundtstykker/arp-spoof
- Owner: rundtstykker
- License: bsd-2-clause
- Created: 2020-09-30T15:36:15.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2020-09-30T15:45:36.000Z (about 5 years ago)
- Last Synced: 2025-01-07T14:24:44.438Z (10 months ago)
- Topics: arp-spoofing, layer2, mitm, python
- Language: Python
- Homepage:
- Size: 5.86 KB
- Stars: 4
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# arp-spoof
A python 2.7 program written to manipulate protocols on layer 2 of OSI model. It effectively places you as MITM in connection.
## Getting Started
To run this program, you should already be in the network (wireless or wired). This program effectively updates the ARP tables on both the router and the target.
## Running the program
Written in python 2.7, make sure to use the appropriate interrupter. You should know the IPs of router and target. Do an Nmap scan if unknown.
## Example usage
python ARP_spoof.py --ip 192.168.0.10 --router 192.168.0.1 --victim 192.168.0.10
## Attention
Please do not use this program where unauthorized.
## Credits
| | |
| ------------------------------------ | ----------- |
| **Author** | @bryanwei |
## License
See the [LICENSE](https://github.com/bryanweielio/arp-spoof/blob/master/LICENSE) file.