PacketSpy is a strong community packet sniffing software designed to seize and analyze community visitors. It offers a complete set of options for inspecting HTTP requests and responses, viewing uncooked payload information, and gathering info about community gadgets. With PacketSpy, you may acquire useful insights into your community’s communication patterns and troubleshoot community points successfully.
Options
- Packet Seize: Seize and analyze community packets in real-time.
- HTTP Inspection: Examine HTTP requests and responses for detailed evaluation.
- Uncooked Payload Viewing: View uncooked payload information for deeper investigation.
- System Info: Collect details about community gadgets, together with IP addresses and MAC addresses.
Set up
git clone https://github.com/HalilDeniz/PacketSpy.git
Necessities
PacketSpy requires the next dependencies to be put in:
pip set up -r necessities.txt
Getting Began
To get began with PacketSpy, use the next command-line choices:
root@denizhalil:/PacketSpy# python3 packetspy.py --help
utilization: packetspy.py [-h] [-t TARGET_IP] [-g GATEWAY_IP] [-i INTERFACE] [-tf TARGET_FIND] [--ip-forward] [-m METHOD]choices:
-h, --help present this assist message and exit
-t TARGET_IP, --target TARGET_IP
Goal IP tackle
-g GATEWAY_IP, --gateway GATEWAY_IP
Gateway IP tackle
-i INTERFACE, --interface INTERFACE
Interface identify
-tf TARGET_FIND, --targetfind TARGET_FIND
Goal IP vary to seek out
--ip-forward, -if Allow packet forwarding
-m METHOD, --method METHOD
Restrict sniffing to a selected HTTP technique
Examples
- System Detection
root@denizhalil:/PacketSpy# python3 packetspy.py -tf 10.0.2.0/24 -i eth0System discovery
**************************************
Ip Tackle Mac Tackle
**************************************
10.0.2.1 52:54:00:12:35:00
10.0.2.2 52:54:00:12:35:00
10.0.2.3 08:00:27:78:66:95
10.0.2.11 08:00:27:65:96:cd
10.0.2.12 08:00:27:2f:64:fe
- Man-in-the-Center Sniffing
root@denizhalil:/PacketSpy# python3 packetspy.py -t 10.0.2.11 -g 10.0.2.1 -i eth0
******************* began sniff *******************HTTP Request:
Technique: b'POST'
Host: b'testphp.vulnweb.com'
Path: b'/userinfo.php'
Supply IP: 10.0.2.20
Supply MAC: 08:00:27:04:e8:82
Protocol: HTTP
Person-Agent: b'Mozilla/5.0 (X11; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0'
Uncooked Payload:
b'uname=admin&cross=mysecretpassword'
HTTP Response:
Standing Code: b'302'
Content material Sort: b'textual content/html; charset=UTF-8'
--------------------------------------------------
FootNote
Https work nonetheless in progress
Contributing
Contributions are welcome! To contribute to PacketSpy, observe these steps:
- Fork the repository.
- Create a brand new department on your function or bug repair.
- Make your modifications and commit them.
- Push your modifications to your forked repository.
- Open a pull request in the principle repository.
Contact
You probably have any questions, feedback, or recommendations about PacketSpy, please be happy to contact me:
License
PacketSpy is launched underneath the MIT License. See LICENSE for extra info.