ArpSpoof


NameArpSpoof JSON
Version 1.1.2 PyPI version JSON
download
home_pagehttps://github.com/mauricelambert/ArpSpoof
SummaryThis package implements an ARP Spoofer for MIM (Man-In-the-Middle) or DoS (Denial of Service) attacks.
upload_time2022-03-14 06:59:52
maintainerMaurice Lambert
docs_urlNone
authorMaurice Lambert
requires_python>=3.6
licenseGPL-3.0 License
keywords arp arpcachepoisonning arpcachepoison network maninthemiddle mim security dos denialofservice
VCS
bugtrack_url
requirements PythonToolsKit scapy
Travis-CI No Travis.
coveralls test coverage No coveralls.
            ![ArpSpoof logo](https://mauricelambert.github.io/info/python/security/ArpSpoof_small.png "ArpSpoof logo")

# ArpSpoof

## Description

This package implements an ARP Spoofer for MIM (Man-In-the-Middle) or DoS (Denial of Service) attacks.

## Requirements

This package require:
 - python3
 - python3 Standard Library
 - Scapy
 - PythonToolsKit

## Installation

```bash
pip install ArpSpoof
```

## Usages

### Command lines

```bash
python3 -m ArpSpoof -h                    # Use python module
python3 ArpSpoof.pyz --help               # Use python executable

ArpSpoof 127.0.0.1 127.0.0.2              # Use console script entry point
ArpSpoof -v 127.0.0.1 127.0.0.2,127.0.0.5 # Spoof multiple targets (verbose mode)
ArpSpoof 127.0.0.1 127.0.0.2-127.0.0.5    # Spoof range of targets
ArpSpoof 127.0.0.1 127.0.0.0/29           # Spoof all network

ArpSpoof 127.0.0.1 127.0.0.0/29 -s -t 1   # Semi (spoof only gateway IP for the targets, interval is 1 seconds)
ArpSpoof 127.0.0.1 127.0.0.0/29 -i 127.0. # Use the loopback interface

ArpSpoof 172.16.10.1 172.16.0.33 -p       # Passive mode
```

### Python3

```python
from ArpSpoof import SpooferARP

spoofer = SpooferARP('172.16.10.1', '172.16.0.35')
spoofer.active_cache_poisonning()

spoofer = SpooferARP('172.16.10.1', '172.16.0.35', conf.iface, False, 0.5)
spoofer.passive_cache_poisonning(asynchronous=True)
spoofer.run = False
spoofer.sniffer.stop()                                   # only with asynchronous mode
spoofer.restore()                                        # only with asynchronous mode

# Multiple targets
spoofer = SpooferARP('127.0.0.1', '127.0.0.2,127.0.0.3') # Spoof multiple targets
spoofer = SpooferARP('127.0.0.1', '127.0.0.2-127.0.0.5') # Spoof range of targets
spoofer = SpooferARP('127.0.0.1', '127.0.0.0/30')        # Spoof all network
```

## Links

 - [Github Page](https://github.com/mauricelambert/ArpSpoof)
 - [Pypi](https://pypi.org/project/ArpSpoof/)
 - [Documentation](https://mauricelambert.github.io/info/python/security/ArpSpoof.html)
 - [Executable](https://mauricelambert.github.io/info/python/security/ArpSpoof.pyz)

## Help

```text
usage: ArpSpoof.py [-h] [--verbose] [--interface INTERFACE] [--time TIME] [--semi] [--passive] gateway target

positional arguments:
  gateway               Gateway IP or hostname
  target                Target IP or hostname

optional arguments:
  -h, --help            show this help message and exit
  --verbose, -v         Mode verbose (print debug message)
  --interface INTERFACE, -i INTERFACE
                        Part of the IP, MAC or name of the interface
  --time TIME, -t TIME  Time in seconds to sleep between sending ARP packets.
  --semi, -s            Spoof IP of the gateway (target will lost internet connection).
  --passive, -p         Passive mode (response to ARP request only)
```

## Licence

Licensed under the [GPL, version 3](https://www.gnu.org/licenses/).


            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/mauricelambert/ArpSpoof",
    "name": "ArpSpoof",
    "maintainer": "Maurice Lambert",
    "docs_url": null,
    "requires_python": ">=3.6",
    "maintainer_email": "mauricelambert434@gmail.com",
    "keywords": "ARP,arpcachepoisonning,arpcachepoison,network,ManInTheMiddle,MIM,Security,DoS,DenialOfService",
    "author": "Maurice Lambert",
    "author_email": "mauricelambert434@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/98/c7/49fa5021084dd81aaf37b3a697e5cc19fdc63c7fe7b5ddc2ff0149359bde/ArpSpoof-1.1.2.tar.gz",
    "platform": "Windows",
    "description": "![ArpSpoof logo](https://mauricelambert.github.io/info/python/security/ArpSpoof_small.png \"ArpSpoof logo\")\n\n# ArpSpoof\n\n## Description\n\nThis package implements an ARP Spoofer for MIM (Man-In-the-Middle) or DoS (Denial of Service) attacks.\n\n## Requirements\n\nThis package require:\n - python3\n - python3 Standard Library\n - Scapy\n - PythonToolsKit\n\n## Installation\n\n```bash\npip install ArpSpoof\n```\n\n## Usages\n\n### Command lines\n\n```bash\npython3 -m ArpSpoof -h                    # Use python module\npython3 ArpSpoof.pyz --help               # Use python executable\n\nArpSpoof 127.0.0.1 127.0.0.2              # Use console script entry point\nArpSpoof -v 127.0.0.1 127.0.0.2,127.0.0.5 # Spoof multiple targets (verbose mode)\nArpSpoof 127.0.0.1 127.0.0.2-127.0.0.5    # Spoof range of targets\nArpSpoof 127.0.0.1 127.0.0.0/29           # Spoof all network\n\nArpSpoof 127.0.0.1 127.0.0.0/29 -s -t 1   # Semi (spoof only gateway IP for the targets, interval is 1 seconds)\nArpSpoof 127.0.0.1 127.0.0.0/29 -i 127.0. # Use the loopback interface\n\nArpSpoof 172.16.10.1 172.16.0.33 -p       # Passive mode\n```\n\n### Python3\n\n```python\nfrom ArpSpoof import SpooferARP\n\nspoofer = SpooferARP('172.16.10.1', '172.16.0.35')\nspoofer.active_cache_poisonning()\n\nspoofer = SpooferARP('172.16.10.1', '172.16.0.35', conf.iface, False, 0.5)\nspoofer.passive_cache_poisonning(asynchronous=True)\nspoofer.run = False\nspoofer.sniffer.stop()                                   # only with asynchronous mode\nspoofer.restore()                                        # only with asynchronous mode\n\n# Multiple targets\nspoofer = SpooferARP('127.0.0.1', '127.0.0.2,127.0.0.3') # Spoof multiple targets\nspoofer = SpooferARP('127.0.0.1', '127.0.0.2-127.0.0.5') # Spoof range of targets\nspoofer = SpooferARP('127.0.0.1', '127.0.0.0/30')        # Spoof all network\n```\n\n## Links\n\n - [Github Page](https://github.com/mauricelambert/ArpSpoof)\n - [Pypi](https://pypi.org/project/ArpSpoof/)\n - [Documentation](https://mauricelambert.github.io/info/python/security/ArpSpoof.html)\n - [Executable](https://mauricelambert.github.io/info/python/security/ArpSpoof.pyz)\n\n## Help\n\n```text\nusage: ArpSpoof.py [-h] [--verbose] [--interface INTERFACE] [--time TIME] [--semi] [--passive] gateway target\n\npositional arguments:\n  gateway               Gateway IP or hostname\n  target                Target IP or hostname\n\noptional arguments:\n  -h, --help            show this help message and exit\n  --verbose, -v         Mode verbose (print debug message)\n  --interface INTERFACE, -i INTERFACE\n                        Part of the IP, MAC or name of the interface\n  --time TIME, -t TIME  Time in seconds to sleep between sending ARP packets.\n  --semi, -s            Spoof IP of the gateway (target will lost internet connection).\n  --passive, -p         Passive mode (response to ARP request only)\n```\n\n## Licence\n\nLicensed under the [GPL, version 3](https://www.gnu.org/licenses/).\n\n",
    "bugtrack_url": null,
    "license": "GPL-3.0 License",
    "summary": "This package implements an ARP Spoofer for MIM (Man-In-the-Middle) or DoS (Denial of Service) attacks.",
    "version": "1.1.2",
    "project_urls": {
        "Documentation": "https://mauricelambert.github.io/info/python/security/ArpSpoof.html",
        "Executable": "https://mauricelambert.github.io/info/python/security/ArpSpoof.pyz",
        "Homepage": "https://github.com/mauricelambert/ArpSpoof"
    },
    "split_keywords": [
        "arp",
        "arpcachepoisonning",
        "arpcachepoison",
        "network",
        "maninthemiddle",
        "mim",
        "security",
        "dos",
        "denialofservice"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "98c749fa5021084dd81aaf37b3a697e5cc19fdc63c7fe7b5ddc2ff0149359bde",
                "md5": "6d5a222221508aca47d082463e6ec6a7",
                "sha256": "d28d6b9b9cf88232758d8b3f94c3282aade8c29bbdc5001d4827447cee7a4faf"
            },
            "downloads": -1,
            "filename": "ArpSpoof-1.1.2.tar.gz",
            "has_sig": false,
            "md5_digest": "6d5a222221508aca47d082463e6ec6a7",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.6",
            "size": 21195,
            "upload_time": "2022-03-14T06:59:52",
            "upload_time_iso_8601": "2022-03-14T06:59:52.434464Z",
            "url": "https://files.pythonhosted.org/packages/98/c7/49fa5021084dd81aaf37b3a697e5cc19fdc63c7fe7b5ddc2ff0149359bde/ArpSpoof-1.1.2.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2022-03-14 06:59:52",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "mauricelambert",
    "github_project": "ArpSpoof",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "requirements": [
        {
            "name": "PythonToolsKit",
            "specs": []
        },
        {
            "name": "scapy",
            "specs": []
        }
    ],
    "lcname": "arpspoof"
}
        
Elapsed time: 0.20044s