Skip to content

Latest commit

 

History

History
52 lines (45 loc) · 1.9 KB

README.md

File metadata and controls

52 lines (45 loc) · 1.9 KB

METH - A Python Based Packet Sniffer

meth working...

A Python3 scapy based Packet Sniffer that has the capabilities of sniffing raw HTTP, TCP, UDP, ICMP, ARP packets and writing the output to .pcap for inspection within tools such as Wireshark.

Features

  • Python 3 Support
  • Raw Packet Capturing
  • Pure Python
  • Cross-Platform
  • Supported Layers: HTTP, TCP, UDP, ICMP

Installation:

Cloning:

$ git clone https://github.com/TheFlash2k/meth.git
$ cd meth/
$ pip3 install -r requirements.txt

First Run:

$ python3 meth.py

Usage

usage: meth.py [-h] [-c COUNT] [-f FILTER [FILTER ...]] [-H] [-o OUTFILE] [-i INTERFACE]

METH - HTTP Packet Sniffer.

optional arguments:
  -h, --help            show this help message and exit
  -c COUNT, --count COUNT
                        Numbers of packets that you need to capture (0 = Infinity)
  -f FILTER [FILTER ...], --filter FILTER [FILTER ...]
                        The Berkeley Packet Filter (BPF) that you need to set. (Default is: 'port 80 and tcp') NOTE: You need to Specify them as a string
  -H, --http-only       Limit the results to display only http/https packets
  -o OUTFILE, --outfile OUTFILE
                        Store all the sniffed packet to a .pcap file (You don't need Specify the extension, just the file name.)
  -i INTERFACE, --interface INTERFACE
                        Specify an interface to sniff traffic on