Skip to content

Advanced network packet analysis and ARP spoofing tool with pattern matching

License

Notifications You must be signed in to change notification settings

zeefxd/ARP-Spoofer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

27 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

ARP Spoofing Tool 🌐

License Python Version

🎯 Overview

Advanced network packet analysis and ARP spoofing tool built with Python. Featuring pattern matching, real-time monitoring, and beautiful reporting interfaces.

✨ Key Features

πŸ” Network Analysis

  • Real-time packet capture and filtering
  • Pattern-based traffic monitoring
  • MAC address resolution
  • Hostname detection

πŸ›‘οΈ ARP Operations

  • Smart gateway detection
  • Target device mapping
  • Traffic interception
  • Custom packet rules

πŸ“Š Reporting & Export

  • Interactive HTML reports
  • JSON data export
  • CSV compatibility
  • Plain text logs

πŸ–₯️ Screenshots

ARP Spoofing Tool in Action

Application Running

Initializes the tool and displays the status of the ARP spoofing attack.

Packet Capture Overview

Packet Capture

Real-time packet capture showing intercepted network packets with source and destination details. (Press Ctrl+C to stop packet capturing)

Export Format Options

Export Format Options

Options for exporting captured data in various formats such as HTML, JSON, CSV, and plain text.

HTML Report

HTML Report

Generated HTML report providing a detailed analysis of the captured packets.

πŸš€ Quick Start

# Clone repository
https://github.com/zeefxd/ARP-Spoofer.git
cd ARP-Spoofer

Install dependencies

pip install -r requirements.txt

Run with default settings

# Linux/macOS
sudo python -m src

# Windows (run PowerShell/CMD as Administrator)
python -m src

⚠️ Note: Root/Administrator privileges are required for network operations

πŸ’» Usage Examples

Basic Monitoring:

# Linux/macOS
sudo python -m src --target 192.168.1.1

# Windows (run PowerShell/CMD as Administrator)
python -m src --target 192.168.1.1

Pattern Matching:

# Linux/macOS
sudo python -m src --patterns "HTTP,FTP"

# Windows (run PowerShell/CMD as Administrator)
python -m src --patterns "HTTP,FTP"

Custom Export:

# Linux/macOS
sudo python -m src --format json

# Windows (run PowerShell/CMD as Administrator)
python -m src --format json

Example:

# Linux/macOS
sudo python -m src -t 192.168.1.10 -g 192.168.1.1 -p "password" "secret" -f html

# Windows (run PowerShell/CMD as Administrator)
python -m src -t 192.168.1.10 -g 192.168.1.1 -p "password" "secret" -f html

πŸ“‹ Command Options

Option Description Default
-t, --target Target IP address Auto-detect
-g, --gateway Gateway IP address Auto-detect
-p, --patterns Search patterns None
-f, --format Export format html

πŸ“ Project Structure

src/
β”œβ”€β”€ core/          # Core functionality
β”œβ”€β”€ network/       # Network operations
β”œβ”€β”€ spoofer/       # ARP implementation
β”œβ”€β”€ models/        # Data models
└── utils/         # Helper functions

πŸ“¦ Dependencies

  • scapy - Network packet manipulation
  • rich - Terminal UI components
  • netifaces - Network interface handling
  • jinja2 - Report templating

πŸ”§ Development

# Setup development environment
python -m venv venv
source venv/Scripts/activate  # Windows
pip install -r requirements-dev.txt

⚠️ Security Notice

Educational Purposes Only: This tool should only be used on networks where you have explicit permission to test.

🀝 Contributing

  1. Fork repository
  2. Create feature branch
  3. Commit changes
  4. Push to branch
  5. Submit pull request

πŸ“œ License

MIT License - See LICENSE file

πŸ‘€ Author

GitHub: @zeefxd

Twitter: @zeefxd

πŸ’¬ Support Report issues on GitHub

About

Advanced network packet analysis and ARP spoofing tool with pattern matching

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published