________ _____________________________
__ ___/_________(_)__ __/__ __/__ ____/___ __
_____ \__ __ \_ /__ /_ __ /_ __ __/ __ |/_/
____/ /_ / / / / _ __/ _ __/ _ /___ __> <
/____/ /_/ /_//_/ /_/ /_/ /_____/ /_/|_|
---- Stealth ARP Spoofing Tool ----
===================================================================
𝕍𝕖𝕣𝕤𝕚𝕠𝕟 : 1.0 𝕋𝕨𝕚𝕥𝕥𝕖𝕣 : anishalx7
===================================================================
SniffEx is a powerful and easy-to-use packet sniffer designed to monitor and capture network traffic, focusing on HTTP requests and identifying potential login information. Whether you are a network security enthusiast, pentester, or developer, SniffEx provides a comprehensive solution for analyzing network traffic in real-time.
This project was built using Python and Scapy, making it lightweight and efficient. With simple commands, users can install, configure, and start monitoring network traffic on their devices.
- Real-time sniffing of network traffic.
- Extracts and displays URLs and HTTP request details.
- Identifies potential login credentials (username and password) from traffic.
- Lightweight and efficient.
- Easy setup and usage.
To run SniffEx, you will need the following:
- Python 3.x
- Scapy (
pip install scapy
) - Scapy-HTTP (
pip install scapy-http
)
To get started, first clone this repository to your local machine:
git clone https://github.com/anishalx/sniffex.git
cd sniffex
Once you have cloned the repository, you need to install the required dependencies:
pip install -r requirements.txt
The required packages include:
- Scapy: For network traffic capturing and packet analysis.
- Scapy-HTTP: For parsing HTTP requests and responses.
If you're using Linux or macOS, running a packet sniffer may require elevated permissions. You can run the script with sudo
:
sudo python3 SniffEx.py
Running Sniffex is straightforward. The tool will prompt you to enter the network interface on which you want to sniff packets.
sudo python3 sniffex.py
After launching the tool, you will be prompted to enter the desired network interface (e.g., eth0, wlan0):
[*] Enter the interface to sniff (e.g., eth0): eth0
SniffEx will automatically capture HTTP requests made by devices on the network. It will display the URLs visited, along with any potential login information found within the packets.
SniffEx allows customization to monitor specific types of traffic. You can modify the code to focus on additional layers, protocols, or extract more detailed information from the captured packets.
If you encounter any issues, here are some common fixes:
-
Permission Denied:
- Ensure you are running the script with sufficient privileges. On Linux/macOS, use
sudo
to run the script:sudo python3 SniffEx.py
- Ensure you are running the script with sufficient privileges. On Linux/macOS, use
-
No Traffic Captured:
- Make sure you are monitoring the correct network interface. You can list the available interfaces using the following command (Linux/macOS):
For Windows, you can use:
ifconfig
Then specify the correct interface in the command:ipconfig
python3 SniffEx.py [*] Enter the interface to sniff (e.g., eth0): wlan0
- Make sure you are monitoring the correct network interface. You can list the available interfaces using the following command (Linux/macOS):
-
Dependencies Missing:
- Verify that all required libraries are installed by running:
pip install -r requirements.txt
- If issues persist, try installing the dependencies manually:
pip install scapy scapy-http
- Verify that all required libraries are installed by running:
-
No HTTP Requests Captured:
- Ensure that the traffic you are capturing is HTTP-based. If the traffic is HTTPS (encrypted), SniffEx will not be able to capture the details without additional tools like SSL stripping.
We welcome contributions from the community! If you have ideas for improvements or new features, please follow these steps:
- Fork the repository.
- Create a new branch (
git checkout -b feature/YourFeature
). - Make your changes and commit them (
git commit -m 'Add some feature'
). - Push your branch (
git push origin feature/YourFeature
). - Open a pull request.
This project is licensed under the MIT License. See the LICENSE file for details.
- Special thanks to Scapy for powering this tool.
- Inspired by various network scanning tools and the open-source community.