Skip to content

A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybersecurity professionals and enthusiasts.

License

Notifications You must be signed in to change notification settings

HalilDeniz/Scapy-Network-Security-Tools

Repository files navigation

Scapy Network Security Tools

Welcome to the Scapy Network Security Tools repository! This repository contains 10 powerful tools designed for network analysis, penetration testing, and security testing. Each tool leverages Python and Scapy to manipulate or inspect network traffic, helping you to better understand network behavior, identify vulnerabilities, and test security mechanisms.

Whether you're a cybersecurity professional, network administrator, or just curious about how network protocols work, these tools provide valuable insights into network traffic and vulnerabilities.

Tools Included:

  1. Network Traffic Monitoring Tool: his tool monitors all incoming and outgoing network traffic on a specified interface. It identifies and categorizes traffic based on protocols such as TCP, UDP, and ICMP, providing real-time monitoring for deeper network insights.
  2. Port Scanner: simple yet effective port scanner that checks for open TCP and UDP ports on a target IP address. It's a fundamental tool for understanding network services and identifying potential attack vectors.
  3. DNS Spoofing Simulation: his tool simulates a DNS spoofing (or DNS cache poisoning) attack. It sends forged DNS responses to redirect victims to a malicious IP address, useful for testing DNS security.
  4. ARP Spoofing Tool: erforms an ARP spoofing attack by intercepting and manipulating network traffic between a victim and the network gateway, commonly used for Man-in-the-Middle (MITM) attacks.
  5. TCP SYN Flood Attack Simulation: imulates a TCP SYN flood attack to test how servers respond to being overwhelmed with incomplete TCP connection requests. This tool can be used to understand how DoS attacks operate.
  6. ICMP Ping Sweep: simple network discovery tool that sends ICMP echo requests (pings) to identify live hosts within a specified IP range. Useful for mapping out networks.
  7. Wi-Fi Packet Injection Tool: his tool injects crafted packets into a Wi-Fi network, allowing for attacks such as deauthentication. It’s an essential tool for wireless network security testing.
  8. Traceroute Tool: aps the path taken by packets to reach their destination by sending packets with incrementally increasing TTL values. This tool helps in diagnosing network routing issues.
  9. SSH Traffic Detection Tool: onitors for SSH traffic on a network by detecting packets sent over port 22, the default port for SSH connections. This tool can be useful for detecting unauthorized SSH access.
  10. Packet Manipulation Tool: Captures network traffic in real-time, allows for modification of packets, and then re-injects them into the network. This tool demonstrates how packet manipulation can be used in both attack and defense scenarios.

About the Author

I’m Deniz Halil, a cybersecurity specialist, author, and software developer with a deep passion for network security, ethical hacking, and programming. On my website, you’ll find a wealth of content including projects, articles, and tutorials focused on Python, networking, and cybersecurity.

For more Python-related projects, be sure to visit the Python Projects category on my website:
Python Projects on DenizHalil.com

You can also connect with me on:

My Books

In addition to building network tools, I’ve authored several books aimed at teaching network analysis, Python programming, and ethical hacking. If you’re interested in furthering your knowledge in these areas, check out my books:

These books are designed to guide you from beginner to advanced levels, equipping you with the tools and knowledge to become proficient in network analysis and cybersecurity.

For more projects and insights, visit my website:
denizhalil.com

Support My Work

If you found these tools and resources useful, please consider supporting my work by buying me a coffee. Your support will help me continue creating open-source tools, writing more books, and sharing free educational content with the community.

Thank you for your support!

Disclaimer

Important: These tools are provided for educational purposes only. They are designed to help users understand network security concepts and perform penetration testing in authorized environments. Do not use these tools on any network without explicit permission from the network owner. Unauthorized usage of these tools may be illegal and could result in severe consequences.

The author assumes no responsibility or liability for any misuse of the tools provided in this repository. Use them responsibly and always ensure you have proper authorization before conducting any network security testing.