NetSentinel – The ultimate CLI tool for network ninjas and digital samurais. Dive into the matrix of network security with this Swiss Army knife of packet manipulation, ARP spoofing, and live host scanning. Designed for ethical hackers, red teams, and anyone who wants to understand the dark arts of networking.
Warning: Use responsibly. Unauthorized use may result in severe consequences. Always obtain explicit permission before testing networks.
- Why NetSentinel?
- Features
- Prerequisites
- Installation
- Usage
- Examples
- Contributing
- License
- Author
- Disclaimer
In the world of ones and zeros, where packets flow like rivers and firewalls guard the gates, NetSentinel is your digital katana. It empowers you to:
- Map out hidden corners of your network.
- Redirect traffic with precision using ARP spoofing.
- Simulate vulnerability detection for educational purposes.
- Learn the intricacies of network protocols without breaking a sweat.
For the curious mind, NetSentinel is not just a tool—it's a gateway to mastering the art of network security.
- ARP Spoofing: Become the man-in-the-middle (MITM) and control the flow of packets between target and gateway.
- Live Host Scanning: Unleash ARP requests to discover every device lurking on your subnet.
- Vulnerability Detection: Simulate the discovery of zero-day vulnerabilities for educational purposes.
- Asynchronous I/O: Scan networks at lightning speed with
asyncio. - Colored Logging: Terminal output so sharp, it could cut glass.
- Cross-Platform Compatibility: Works on Linux, macOS, and Windows (with WSL).
Before summoning the power of NetSentinel, ensure you have:
- Python 3.7+: Modern Python features are baked into the codebase.
- Scapy: A library for crafting and sending packets—your ticket to the network underworld.
- Termcolor: Add spice to your terminal with colored output.
- Root Privileges: Some operations require elevated permissions (e.g., ARP spoofing).
-
Clone the Repository:
git clone https://github.com/yourusername/NetSentinel.git cd NetSentinel -
Install Dependencies:
pip install -r requirements.txt
-
Optional: Virtual Environment: Protect your system from dependency chaos by creating a virtual environment:
python3 -m venv venv source venv/bin/activate # On Linux/Mac venv\Scripts\activate # On Windows pip install -r requirements.txt
Summon the power of NetSentinel with these arcane incantations:
Usage: python netsentinel.py [options]
Options:
-i, --interface <interface> Specify the network interface to use (e.g., wlan0, eth0).
Tip: Use 'ifconfig' or 'ip a' to list interfaces.
-t, --target <IP> Specify the target IP address.
-g, --gateway <IP> Specify the gateway IP address.
-s, --scan <network> Specify the network range to scan (e.g., 192.168.1.0/24).
-h, --help Display this help message.
Unveil the secrets of your subnet:
sudo python netsentinel.py -s 192.168.1.0/24Output:
[INFO] Scanning live hosts...
[INFO] Host 192.168.1.1 is up --> MAC: 00:1A:2B:3C:4D:5E
[INFO] Scan results saved to netsentinel_results.txt
Redirect traffic like a digital puppet master:
sudo python netsentinel.py -i wlan0 -t 192.168.1.10 -g 192.168.1.1Output:
[INFO] Target: 192.168.1.10, Gateway: 192.168.1.1, Interface: wlan0
[INFO] Open Wireshark and use filter 'ip.addr==192.168.1.10'
[INFO] Both target and gateway are reachable. Proceeding with ARP spoofing.
[INFO] ARP Packets Sent: 2
[INFO] ARP Packets Sent: 4
...
Press Enter to stop ARP poisoning...
Wanna join the ranks of digital warriors? Here's how:
- Fork the repository.
- Create a new branch (
git checkout -b feature/new-feature). - Commit your changes (
git commit -m "Add new feature"). - Push to the branch (
git push origin feature/new-feature). - Submit a pull request.
This project is licensed under the MIT License. See the LICENSE file for details.
M.Armaoui
- Email: [email protected]
NetSentinel is crafted for educational purposes only. Unauthorized use on any network without explicit permission is illegal and unethical. The author assumes no liability for misuse of this software. Always seek proper authorization before probing networks. Remember: With great power comes great responsibility.
Stay curious, stay secure, and keep hacking responsibly. May the packets be with you! 🚀
