Skip to content

A Python ARP spoofing tool using Scapy to intercept DNS traffic in a local network. It captures DNS records and exfiltrates them to a remote server, uploading the data every hour.

Notifications You must be signed in to change notification settings

njeru-codes/Phaedra

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PHAEDRA

This project provides a MITM ARP spoofing tool designed for capturing DNS traffic within a local network.
⚠️ Disclaimer:
This tool is intended for educational and ethical use only. Unauthorized use on networks without explicit permission may violate legal and ethical standards.

                              _____  _                    _                
                              |  __ \| |                  | |              
                              | |__) | |__   __ _  ___  __| |_ __ __ _ 
                              |  ___/| '_ \ / _` |/ _ \/ _` | '__/ _` |
                              | |    | | | | (_| |  __/ (_| | | | (_| | 
                              |_|    |_| |_|\__,_|\___|\__,_|_|  \__,_|  
                                                                      

USAGE

clone the repo and run install.sh

    git clone git@github.com:njeru-codes/Phaedra.git
    cd Phaedra
    chmod +x install
    sudo ./install
    sudo pheedra-sniffer   #runs the script

smaple usage

sudo $(which python3) sniffer.py --network 192.168.100.0/24 --iface eth0 --router_ip 192.168.100.1

SCREENSHOTS

Screenshot From 2024-12-22 03-13-26

About

A Python ARP spoofing tool using Scapy to intercept DNS traffic in a local network. It captures DNS records and exfiltrates them to a remote server, uploading the data every hour.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published