A script for educational demonstration of ARP spoofing using Python and Scapy. It allows poisoning of ARP caches of target devices and gateways, potentially setting up a Man-in-the-Middle (MitM) attack.
- Educational Use Only: This tool is meant for testing on networks you own or have explicit permission to test.
- Illegal on Unauthorized Networks: Unauthorized use is a criminal offense in many jurisdictions.
- No Warranty: The author takes no responsibility for misuse, damage, or legal consequences.
- Scapy-powered ARP request/response spoofing
- Gateway + target ARP poisoning
- MAC address resolution with fallback
- Auto-cleanup (restores original ARP mappings on exit)
- Clean, CLI-based interface with
argparse - Logging and error suppression for user clarity
- Python 3.x
pip install -r requirements.txtsudoor admin access required
git clone https://github.com/YOUR_USERNAME/python-arp-spoofer.git
cd python-arp-spoofer
pip install -r requirements.txtsudo python3 arp_spoofer.py <target_ip> <gateway_ip> -i <interface>sudo python3 arp_spoofer.py 192.168.1.5 192.168.1.1 -i eth0- IP range scanning to select targets interactively
- Dry-run mode
- Advanced logging / PCAP dump
- Web UI overlay (optional)
This tool was developed for network security enthusiasts and ethical hackers. Contributions welcome.