Skip to content

3rr0r-505/NetWhisper

Repository files navigation

   

NetWhisper - Network Packet Sniffer Tool

NetWhisper is a command-line tool for capturing and analyzing network packets.

Demo

NetWhisper Demo

Features

  • Capture packets from a specific network interface
  • Capture a specific number of packets
  • Capture packets with a specific IP address
  • Capture only TCP packets
  • Display packets in HEX and ASCII values
  • Save captured packets to a file
  • Read captured packets from a file
  • Display available network interfaces

Installation

  1. Clone the repository:
    git clone https://github.com/3rr0r-505/netwhisper.git
    
  2. Navigate to the project directory:
    cd NetWhisper
    
  3. Install the required dependencies using pip:
    pip install -r requirements.txt
    

Usage

CLI Mode:

  • Display all available network interfaces:
    python netwhisper.py
    
  • Capture packets from a specific interface:
    python netwhisper.py -i eth0
    
  • Capture a specific number of packets:
    python netwhisper.py -i eth0 -c 100
    
  • Capture only TCP packets:
    python netwhisper.py -i eth0 -tcp
    
  • Display packets in HEX and ASCII values:
    python netwhisper.py -i eth0 -hexascii
    
  • Save captured packets to a file:
    python netwhisper.py -i eth0 -s captured_packets.pcap
    
  • Read captured packets from a file:
    python netwhisper.py -r captured_packets.pcap
    

GUI Mode:

  • For linux
    python netwhisper_gui.py
    
  • For Windows
    Go to dist folder and run the netwhisper_gui.exe

⚠️Note:

If you encounter permission issues while capturing packets, try running the tool with sudo.

Legal Disclaimer

The use of code contained in this repository, either in part or in its totality, for engaging targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws.

Developers assume no liability and are not responsible for misuses or damages caused by any code contained in this repository in any event that, accidentally or otherwise, it comes to be utilized by a threat agent or unauthorized entity as a means to compromise the security, privacy, confidentiality, integrity, and/or availability of systems and their associated resources. In this context the term "compromise" is henceforth understood as the leverage of exploitation of known or unknown vulnerabilities present in said systems, including, but not limited to, the implementation of security controls, human- or electronically-enabled.

The use of this code is only endorsed by the developers in those circumstances directly related to educational environments or authorized penetration testing engagements whose declared purpose is that of finding and mitigating vulnerabilities in systems, limiting their exposure to compromises and exploits employed by malicious agents as defined in their respective threat models.

License

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.