Advanced network packet analysis and ARP spoofing tool built with Python. Featuring pattern matching, real-time monitoring, and beautiful reporting interfaces.
π Network Analysis
- Real-time packet capture and filtering
- Pattern-based traffic monitoring
- MAC address resolution
- Hostname detection
π‘οΈ ARP Operations
- Smart gateway detection
- Target device mapping
- Traffic interception
- Custom packet rules
π Reporting & Export
- Interactive HTML reports
- JSON data export
- CSV compatibility
- Plain text logs
Initializes the tool and displays the status of the ARP spoofing attack.
Real-time packet capture showing intercepted network packets with source and destination details. (Press Ctrl+C to stop packet capturing)
Options for exporting captured data in various formats such as HTML, JSON, CSV, and plain text.
Generated HTML report providing a detailed analysis of the captured packets.
# Clone repository
https://github.com/zeefxd/ARP-Spoofer.git
cd ARP-Spoofer
pip install -r requirements.txt
# Linux/macOS
sudo python -m src
# Windows (run PowerShell/CMD as Administrator)
python -m src
β οΈ Note: Root/Administrator privileges are required for network operations
# Linux/macOS
sudo python -m src --target 192.168.1.1
# Windows (run PowerShell/CMD as Administrator)
python -m src --target 192.168.1.1
# Linux/macOS
sudo python -m src --patterns "HTTP,FTP"
# Windows (run PowerShell/CMD as Administrator)
python -m src --patterns "HTTP,FTP"
# Linux/macOS
sudo python -m src --format json
# Windows (run PowerShell/CMD as Administrator)
python -m src --format json
# Linux/macOS
sudo python -m src -t 192.168.1.10 -g 192.168.1.1 -p "password" "secret" -f html
# Windows (run PowerShell/CMD as Administrator)
python -m src -t 192.168.1.10 -g 192.168.1.1 -p "password" "secret" -f html
Option | Description | Default |
---|---|---|
-t, --target | Target IP address | Auto-detect |
-g, --gateway | Gateway IP address | Auto-detect |
-p, --patterns | Search patterns | None |
-f, --format | Export format | html |
src/
βββ core/ # Core functionality
βββ network/ # Network operations
βββ spoofer/ # ARP implementation
βββ models/ # Data models
βββ utils/ # Helper functions
- scapy - Network packet manipulation
- rich - Terminal UI components
- netifaces - Network interface handling
- jinja2 - Report templating
# Setup development environment
python -m venv venv
source venv/Scripts/activate # Windows
pip install -r requirements-dev.txt
Educational Purposes Only: This tool should only be used on networks where you have explicit permission to test.
- Fork repository
- Create feature branch
- Commit changes
- Push to branch
- Submit pull request
MIT License - See LICENSE file
GitHub: @zeefxd
Twitter: @zeefxd
π¬ Support Report issues on GitHub