Skip to content
This repository has been archived by the owner on May 25, 2021. It is now read-only.

imadhsissou/python-arp-spoofer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

33 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

[NO LONGER MAINTAINED]

Pyarp

Pyarp is a simple pen testing tool, written in python. It intercepts packets on a switched LAN by forging ARP replies. It comes with a line-oriented command interpreter, with autocomplete feature and commands history.

Dependencies

# apt-get install python-dev
# apt-get install setuptools
# apt-get install python-pip

Installation

# pip install pyarp

Documentation

Type help [command] to display the information about a command, or check the Manual for full documentation.

Notice : the beta version doesn't support IPv6 yet.

Usage example

Set your network interface (press <tab> to list all network interfaces)

pyarp>> iface wlan0
pyarp>>

Scan for connected hosts on LAN

pyarp>> scan 192.168.1.0/24
Begin emission:
**Finished to send 256 packets.
...
Received 5 packets, got 2 answers, remaining 254 packets

inet 192.168.1.0/24
iface wlan0

Host 1: MAC a4:7e:39:ab:fb:e0  IP 192.168.1.1
Host 2: MAC 00:0c:6e:da:49:ab  IP 192.168.1.4
pyarp>>

Launch MITM attack (Ctrl + C to terminate)

pyarp>> spoof 192.168.1.1 192.168.1.4

[+] Attack Launched.

.
Sent 1 packets.
.
Sent 1 packets.
^C
[+] Attack stopped, successful recover.

pyarp>>

License

The contents of this repository is licensed under MIT License.

About

A friendly command-line spoofing tool written in python using scapy and netifaces.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •  

Languages