• clone repository:
git clone https://github.com/EvtDanya/ARP-Spoofing
• go to install folder and install requirements:
chmod +x install.sh
sudo ./install.sh
To see what this tool can, run the following command:
python3 ./arp-spoofing.py -h
You need to specify the ip address of the victim, the gateway and also specify the network interface to sniff on. After all intercepted packets will be saved in "dumps/" directory and victim's ARP table will be restored. By default, 100 packets are intercepted
If you have any questions or suggestions, please dm me https://t.me/evtdanya