in

A Python ARP And DNS Spoofer Cli And Interface


PyPI - Python Version

A Python ARP and DNS Spoofer CLI and INTERFACE

CLI -> advanced pentesters

INTERFACE -> beginners

Make sure you installed Python/Python3
Please, install netfilterqueue and scapy as prerequisites

CLI

	python arp_spoof_nxgenspf.py [-s] [-a]

WARNING : You cannot use both !

[-s] : single target

[-a] : all network is targeted

Please, know the IP ADDRESSE(S) of the network/victim you want to attack.

INTERFACE

Example:

	interface = eno1
	@IP TARGET = 192.168.10.9

PLS, USE IT RIGHT AFTER YOU LAUNCHED ARP SPOOF

CLI

"www." are not ALWAYS useful for the domain name.
You can edit the file to spoof any domain you want.

INTERFACE

Example

DNS NAME = google.com
DNS @IP = <your malicious web server> 

GitHub – saladandonionrings/nextgen_spoofer: python tkinter arp / dns spoof

python tkinter arp / dns spoof. Contribute to saladandonionrings/nextgen_spoofer development by creating an account on GitHub.


Leave a Reply

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

GIPHY App Key not set. Please check settings

AutoIt Scripts Examples – InfoSec Memo

Pausing to Remember on the Twentieth Anniversary of September 11, 2001