Skip to content

verge27/python-arp-spoofer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Python ARP Spoofing Tool

A script for educational demonstration of ARP spoofing using Python and Scapy. It allows poisoning of ARP caches of target devices and gateways, potentially setting up a Man-in-the-Middle (MitM) attack.


⚠️ Legal & Ethical Disclaimer

  • Educational Use Only: This tool is meant for testing on networks you own or have explicit permission to test.
  • Illegal on Unauthorized Networks: Unauthorized use is a criminal offense in many jurisdictions.
  • No Warranty: The author takes no responsibility for misuse, damage, or legal consequences.

✨ Features

  • Scapy-powered ARP request/response spoofing
  • Gateway + target ARP poisoning
  • MAC address resolution with fallback
  • Auto-cleanup (restores original ARP mappings on exit)
  • Clean, CLI-based interface with argparse
  • Logging and error suppression for user clarity

📦 Requirements

  • Python 3.x
  • pip install -r requirements.txt
  • sudo or admin access required

🚀 Installation

git clone https://github.com/YOUR_USERNAME/python-arp-spoofer.git
cd python-arp-spoofer
pip install -r requirements.txt

🛠 Usage

sudo python3 arp_spoofer.py <target_ip> <gateway_ip> -i <interface>

Example:

sudo python3 arp_spoofer.py 192.168.1.5 192.168.1.1 -i eth0

🔧 To Do / Improvements

  • IP range scanning to select targets interactively
  • Dry-run mode
  • Advanced logging / PCAP dump
  • Web UI overlay (optional)

👨‍💻 Author & Credits

This tool was developed for network security enthusiasts and ethical hackers. Contributions welcome.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages