![ArpSpoof logo](https://mauricelambert.github.io/info/python/security/ArpSpoof_small.png "ArpSpoof logo")
# ArpSpoof
## Description
This package implements an ARP Spoofer for MIM (Man-In-the-Middle) or DoS (Denial of Service) attacks.
## Requirements
This package require:
- python3
- python3 Standard Library
- Scapy
- PythonToolsKit
## Installation
```bash
pip install ArpSpoof
```
## Usages
### Command lines
```bash
python3 -m ArpSpoof -h # Use python module
python3 ArpSpoof.pyz --help # Use python executable
ArpSpoof 127.0.0.1 127.0.0.2 # Use console script entry point
ArpSpoof -v 127.0.0.1 127.0.0.2,127.0.0.5 # Spoof multiple targets (verbose mode)
ArpSpoof 127.0.0.1 127.0.0.2-127.0.0.5 # Spoof range of targets
ArpSpoof 127.0.0.1 127.0.0.0/29 # Spoof all network
ArpSpoof 127.0.0.1 127.0.0.0/29 -s -t 1 # Semi (spoof only gateway IP for the targets, interval is 1 seconds)
ArpSpoof 127.0.0.1 127.0.0.0/29 -i 127.0. # Use the loopback interface
ArpSpoof 172.16.10.1 172.16.0.33 -p # Passive mode
```
### Python3
```python
from ArpSpoof import SpooferARP
spoofer = SpooferARP('172.16.10.1', '172.16.0.35')
spoofer.active_cache_poisonning()
spoofer = SpooferARP('172.16.10.1', '172.16.0.35', conf.iface, False, 0.5)
spoofer.passive_cache_poisonning(asynchronous=True)
spoofer.run = False
spoofer.sniffer.stop() # only with asynchronous mode
spoofer.restore() # only with asynchronous mode
# Multiple targets
spoofer = SpooferARP('127.0.0.1', '127.0.0.2,127.0.0.3') # Spoof multiple targets
spoofer = SpooferARP('127.0.0.1', '127.0.0.2-127.0.0.5') # Spoof range of targets
spoofer = SpooferARP('127.0.0.1', '127.0.0.0/30') # Spoof all network
```
## Links
- [Github Page](https://github.com/mauricelambert/ArpSpoof)
- [Pypi](https://pypi.org/project/ArpSpoof/)
- [Documentation](https://mauricelambert.github.io/info/python/security/ArpSpoof.html)
- [Executable](https://mauricelambert.github.io/info/python/security/ArpSpoof.pyz)
## Help
```text
usage: ArpSpoof.py [-h] [--verbose] [--interface INTERFACE] [--time TIME] [--semi] [--passive] gateway target
positional arguments:
gateway Gateway IP or hostname
target Target IP or hostname
optional arguments:
-h, --help show this help message and exit
--verbose, -v Mode verbose (print debug message)
--interface INTERFACE, -i INTERFACE
Part of the IP, MAC or name of the interface
--time TIME, -t TIME Time in seconds to sleep between sending ARP packets.
--semi, -s Spoof IP of the gateway (target will lost internet connection).
--passive, -p Passive mode (response to ARP request only)
```
## Licence
Licensed under the [GPL, version 3](https://www.gnu.org/licenses/).
Raw data
{
"_id": null,
"home_page": "https://github.com/mauricelambert/ArpSpoof",
"name": "ArpSpoof",
"maintainer": "Maurice Lambert",
"docs_url": null,
"requires_python": ">=3.6",
"maintainer_email": "mauricelambert434@gmail.com",
"keywords": "ARP,arpcachepoisonning,arpcachepoison,network,ManInTheMiddle,MIM,Security,DoS,DenialOfService",
"author": "Maurice Lambert",
"author_email": "mauricelambert434@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/98/c7/49fa5021084dd81aaf37b3a697e5cc19fdc63c7fe7b5ddc2ff0149359bde/ArpSpoof-1.1.2.tar.gz",
"platform": "Windows",
"description": "![ArpSpoof logo](https://mauricelambert.github.io/info/python/security/ArpSpoof_small.png \"ArpSpoof logo\")\n\n# ArpSpoof\n\n## Description\n\nThis package implements an ARP Spoofer for MIM (Man-In-the-Middle) or DoS (Denial of Service) attacks.\n\n## Requirements\n\nThis package require:\n - python3\n - python3 Standard Library\n - Scapy\n - PythonToolsKit\n\n## Installation\n\n```bash\npip install ArpSpoof\n```\n\n## Usages\n\n### Command lines\n\n```bash\npython3 -m ArpSpoof -h # Use python module\npython3 ArpSpoof.pyz --help # Use python executable\n\nArpSpoof 127.0.0.1 127.0.0.2 # Use console script entry point\nArpSpoof -v 127.0.0.1 127.0.0.2,127.0.0.5 # Spoof multiple targets (verbose mode)\nArpSpoof 127.0.0.1 127.0.0.2-127.0.0.5 # Spoof range of targets\nArpSpoof 127.0.0.1 127.0.0.0/29 # Spoof all network\n\nArpSpoof 127.0.0.1 127.0.0.0/29 -s -t 1 # Semi (spoof only gateway IP for the targets, interval is 1 seconds)\nArpSpoof 127.0.0.1 127.0.0.0/29 -i 127.0. # Use the loopback interface\n\nArpSpoof 172.16.10.1 172.16.0.33 -p # Passive mode\n```\n\n### Python3\n\n```python\nfrom ArpSpoof import SpooferARP\n\nspoofer = SpooferARP('172.16.10.1', '172.16.0.35')\nspoofer.active_cache_poisonning()\n\nspoofer = SpooferARP('172.16.10.1', '172.16.0.35', conf.iface, False, 0.5)\nspoofer.passive_cache_poisonning(asynchronous=True)\nspoofer.run = False\nspoofer.sniffer.stop() # only with asynchronous mode\nspoofer.restore() # only with asynchronous mode\n\n# Multiple targets\nspoofer = SpooferARP('127.0.0.1', '127.0.0.2,127.0.0.3') # Spoof multiple targets\nspoofer = SpooferARP('127.0.0.1', '127.0.0.2-127.0.0.5') # Spoof range of targets\nspoofer = SpooferARP('127.0.0.1', '127.0.0.0/30') # Spoof all network\n```\n\n## Links\n\n - [Github Page](https://github.com/mauricelambert/ArpSpoof)\n - [Pypi](https://pypi.org/project/ArpSpoof/)\n - [Documentation](https://mauricelambert.github.io/info/python/security/ArpSpoof.html)\n - [Executable](https://mauricelambert.github.io/info/python/security/ArpSpoof.pyz)\n\n## Help\n\n```text\nusage: ArpSpoof.py [-h] [--verbose] [--interface INTERFACE] [--time TIME] [--semi] [--passive] gateway target\n\npositional arguments:\n gateway Gateway IP or hostname\n target Target IP or hostname\n\noptional arguments:\n -h, --help show this help message and exit\n --verbose, -v Mode verbose (print debug message)\n --interface INTERFACE, -i INTERFACE\n Part of the IP, MAC or name of the interface\n --time TIME, -t TIME Time in seconds to sleep between sending ARP packets.\n --semi, -s Spoof IP of the gateway (target will lost internet connection).\n --passive, -p Passive mode (response to ARP request only)\n```\n\n## Licence\n\nLicensed under the [GPL, version 3](https://www.gnu.org/licenses/).\n\n",
"bugtrack_url": null,
"license": "GPL-3.0 License",
"summary": "This package implements an ARP Spoofer for MIM (Man-In-the-Middle) or DoS (Denial of Service) attacks.",
"version": "1.1.2",
"project_urls": {
"Documentation": "https://mauricelambert.github.io/info/python/security/ArpSpoof.html",
"Executable": "https://mauricelambert.github.io/info/python/security/ArpSpoof.pyz",
"Homepage": "https://github.com/mauricelambert/ArpSpoof"
},
"split_keywords": [
"arp",
"arpcachepoisonning",
"arpcachepoison",
"network",
"maninthemiddle",
"mim",
"security",
"dos",
"denialofservice"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "98c749fa5021084dd81aaf37b3a697e5cc19fdc63c7fe7b5ddc2ff0149359bde",
"md5": "6d5a222221508aca47d082463e6ec6a7",
"sha256": "d28d6b9b9cf88232758d8b3f94c3282aade8c29bbdc5001d4827447cee7a4faf"
},
"downloads": -1,
"filename": "ArpSpoof-1.1.2.tar.gz",
"has_sig": false,
"md5_digest": "6d5a222221508aca47d082463e6ec6a7",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.6",
"size": 21195,
"upload_time": "2022-03-14T06:59:52",
"upload_time_iso_8601": "2022-03-14T06:59:52.434464Z",
"url": "https://files.pythonhosted.org/packages/98/c7/49fa5021084dd81aaf37b3a697e5cc19fdc63c7fe7b5ddc2ff0149359bde/ArpSpoof-1.1.2.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2022-03-14 06:59:52",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "mauricelambert",
"github_project": "ArpSpoof",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"requirements": [
{
"name": "PythonToolsKit",
"specs": []
},
{
"name": "scapy",
"specs": []
}
],
"lcname": "arpspoof"
}