Skip to content

This is a lightweight ARP spoofing tool written in Python using Scapy. It allows you to perform man-in-the-middle (MITM) attacks by poisoning the ARP cache of a victim and the gateway. It also includes a restore function to cleanly revert ARP tables upon termination.

License

Notifications You must be signed in to change notification settings

OctoDev4/EtherShade

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🕷️ ARP Spoofing Tool

A lightweight Python tool for performing ARP spoofing attacks using Scapy. It targets a victim and a gateway to become a man-in-the-middle (MITM), allowing packet interception on a local network. The tool also restores the ARP tables after interruption and supports IP forwarding for full packet relay. Image


📦 Features

  • Sends crafted ARP replies to poison the ARP cache of the target and gateway
  • Supports two-way spoofing (victim <-> gateway)
  • Automatically restores ARP tables on exit
  • Displays live spoofing status
  • Clean and readable Python codebase
  • Includes IP forwarding toggle instructions

🔧 Requirements

  • Python 3.x
  • Scapy library (pip install scapy)
  • Root privileges (required to send raw packets)
  • Linux system (recommended)

⚙️ How to Use

# 1. Enable IP forwarding (required for traffic to pass through your machine)

sudo sysctl -w net.ipv4.ip_forward=1

# 2. Run the attack
sudo python3 EtherShade.py --target <TARGET_IP> --gateway <GATEWAY_IP>

# Example:
sudo python3 EtherShade.py --target 192.168.1.10 --gateway 192.168.1.1

# 3. Stop the attack with Ctrl+C
# The script will automatically restore the ARP tables of both the target and the gateway.

# 4. Disable IP forwarding (recommended after the attack)
sudo sysctl -w net.ipv4.ip_forward=0

#5. Verify status
cat /proc/sys/net/ipv4/ip_forward

🔒 Disclaimer This tool is intended for educational purposes only. Unauthorized use on networks you do not own or have permission to test is illegal and unethical.

About

This is a lightweight ARP spoofing tool written in Python using Scapy. It allows you to perform man-in-the-middle (MITM) attacks by poisoning the ARP cache of a victim and the gateway. It also includes a restore function to cleanly revert ARP tables upon termination.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages