Skip to content

Packet Sniffer with capabilities to sniff raw tcp, udp, http, icmp, ftp, ssh, sftp packets and filter them using berkley filters

Notifications You must be signed in to change notification settings

TheFlash2k/meth

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 

Repository files navigation

METH - A Python Based Packet Sniffer

meth working...

A Python3 scapy based Packet Sniffer that has the capabilities of sniffing raw HTTP, TCP, UDP, ICMP, ARP packets and writing the output to .pcap for inspection within tools such as Wireshark.

Features

  • Python 3 Support
  • Raw Packet Capturing
  • Pure Python
  • Cross-Platform
  • Supported Layers: HTTP, TCP, UDP, ICMP

Installation:

Cloning:

$ git clone https://github.com/TheFlash2k/meth.git
$ cd meth/
$ pip3 install -r requirements.txt

First Run:

$ python3 meth.py

Usage

usage: meth.py [-h] [-c COUNT] [-f FILTER [FILTER ...]] [-H] [-o OUTFILE] [-i INTERFACE]

METH - HTTP Packet Sniffer.

optional arguments:
  -h, --help            show this help message and exit
  -c COUNT, --count COUNT
                        Numbers of packets that you need to capture (0 = Infinity)
  -f FILTER [FILTER ...], --filter FILTER [FILTER ...]
                        The Berkeley Packet Filter (BPF) that you need to set. (Default is: 'port 80 and tcp') NOTE: You need to Specify them as a string
  -H, --http-only       Limit the results to display only http/https packets
  -o OUTFILE, --outfile OUTFILE
                        Store all the sniffed packet to a .pcap file (You don't need Specify the extension, just the file name.)
  -i INTERFACE, --interface INTERFACE
                        Specify an interface to sniff traffic on

About

Packet Sniffer with capabilities to sniff raw tcp, udp, http, icmp, ftp, ssh, sftp packets and filter them using berkley filters

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages