Skip to content

Latest commit

Β 

History

History
70 lines (45 loc) Β· 1.61 KB

File metadata and controls

70 lines (45 loc) Β· 1.61 KB

Python ARP Spoofing Tool

A script for educational demonstration of ARP spoofing using Python and Scapy. It allows poisoning of ARP caches of target devices and gateways, potentially setting up a Man-in-the-Middle (MitM) attack.


⚠️ Legal & Ethical Disclaimer

  • Educational Use Only: This tool is meant for testing on networks you own or have explicit permission to test.
  • Illegal on Unauthorized Networks: Unauthorized use is a criminal offense in many jurisdictions.
  • No Warranty: The author takes no responsibility for misuse, damage, or legal consequences.

✨ Features

  • Scapy-powered ARP request/response spoofing
  • Gateway + target ARP poisoning
  • MAC address resolution with fallback
  • Auto-cleanup (restores original ARP mappings on exit)
  • Clean, CLI-based interface with argparse
  • Logging and error suppression for user clarity

πŸ“¦ Requirements

  • Python 3.x
  • pip install -r requirements.txt
  • sudo or admin access required

πŸš€ Installation

git clone https://github.com/YOUR_USERNAME/python-arp-spoofer.git
cd python-arp-spoofer
pip install -r requirements.txt

πŸ›  Usage

sudo python3 arp_spoofer.py <target_ip> <gateway_ip> -i <interface>

Example:

sudo python3 arp_spoofer.py 192.168.1.5 192.168.1.1 -i eth0

πŸ”§ To Do / Improvements

  • IP range scanning to select targets interactively
  • Dry-run mode
  • Advanced logging / PCAP dump
  • Web UI overlay (optional)

πŸ‘¨β€πŸ’» Author & Credits

This tool was developed for network security enthusiasts and ethical hackers. Contributions welcome.