Skip to main content

Aggressive Sniffer & MITM Launcher

Project description

StealthChopper

Aggressive Sniffer & MITM Launcher

Python Platform License Version


This Python-based tool allows network monitoring professionals and security enthusiasts to quickly launch Ettercap, Bettercap, and Wireshark for packet sniffing and MITM analysis on a selected target IP and interface. It also analyzes PCAP files, filtering packets by URL and/or IP, and displays which domains were visited by a specific IP along with timestamps and visit status.

Features

  1. Custom Packet Filter Generator: Automatically generates and compiles an Ettercap filter file to drop traffic from all IPs except the target.
  2. Wireshark Auto-Launch with Filters: Opens Wireshark with a live display filter for the target IP and optionally filtered domains from url_file.txt.
  3. PCAP Analyzer: This tool allows you to analyze PCAP files and filter packets based on a specific URL and/or IP address. It shows which domains were visited by a particular IP, including timestamps and visit status.

Installation (with pip)

curl -LO https://raw.githubusercontent.com/cyb2rS2c/StealthChopper/refs/heads/main/setup_pip.sh
chmod +x setup_pip.sh; source ./setup_pip.sh

Project Tree

.
├── 192.168.0.121_filtered_activity.pcap
├── assets
├── ├── targets.txt
│   ├── tld.txt
│   └── url_file.txt
├── excluded_ips.ef
├── excluded_ips.efc
├── LICENSE
├── README.md
├── requirements.txt
├── setup.sh
├── setup_pip.sh (optional using pip)
└── src
    ├── animation.py
    ├── common_url.py
    ├── extraction.py
    ├── listenOnSomeOne.py
    ├── recon_scan.py
    ├── process_pcap.py
    └── validation.py

Installation (GitHub)

  1. Clone the repository:
git clone https://github.com/cyb2rS2c/StealthChopper.git
cd StealthChopper
  1. Install the required Python dependencies and run the program (Interactive):
chmod +x setup.sh;source ./setup.sh

Usage

Run the script as root, specifying the target IP and interface as arguments:

Option1 (Manually)

sudo python3 src/listenOnSomeOne.py <target_ip> <interface>

Option2 (Wizard)

sudo python3 src/listenOnSomeOne.py --scan

Option3

sudo python3 src/listenOnSomeOne.py --interactive

Example:

sudo python3 listenOnSomeOne.py 192.168.1.121 wlan0
  • <target_ip>: The single IPv4 address you want to target.
  • <interface>: The network interface to use (e.g., eth0, wlan0).

The script will:

1-Validate your IP and interface input.
2-Ensure url_file.txt exists (generates it via common_url.py if missing).
3-Create a custom filter file excluding all other IPs.
4-Compile the filter file for Ettercap.
5-Launch Ettercap, Bettercap, and Wireshark in separate terminal sessions.
6-Apply a Wireshark filter for target IP and optionally domains from url_file.txt.
Tip: Press Ctrl+C in the main terminal to exit gracefully.

PCAP Analyzer

Usage

python3 src/process_pcap.py -f <pcap_file> -s [filter_url] -i [filter_ip] -c [country] -t [HH:MM:SS | YYYY-MM-DD | YYYY-MM-DD HH:MM:SS]

Example:

1. Check if a user has visited linkedin.com from a specific IP address:

# Check if the user with IP "192.168.1.121" has visited "linkedin.com"
# If so, it will show the visit time and other useful details.
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -s ".*linkedin.com" -i "192.168.1.121"

# Alternatively, you can search for just "linkedin" (without the full domain).
# This will match any domain containing "linkedin" like linkedin.com etc.
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -s "linkedin" -i "192.168.1.121"

2. Check all websites visited by a user with a specific IP address:

# This will display all the domains the user has queried in the PCAP.
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -i "192.168.1.121"

3. Check all users who have visited linkedin.com:

# This will display all users who have visited any domain containing "linkedin".
# It shows the visit status, including the time of visit.
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -s "linkedin"

4. Check users by country:

# This will display all users who have visited any domain containing "linkedin".
# It filters results by country, showing only visits from users in the specified country (e.g., US).
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -s "linkedin" -c "US"

5. Check users by specific visit time:

# This will display all users who visited any domain containing "linkedin" on a specific date and time (e.g., "2025-12-07 13:20:30").
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -s "linkedin" -t "2025-12-07 13:20:30"

6. New Features / Changes

The following columns have been added and can now be filtered:

Vendor - the manufacturer of the device, based on the MAC address.

MAC Address - the device’s network interface identifier.

Hostname - the resolved name of the device.

# Example
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -v "Liteon" -H "router" -m "00:00:00:00:00:00"

Tip: Use Regex for domain filtering as shown in the example above if you don't want to enter the full FQDN.

6. Help

To get help on how to use the script, you can view the usage instructions with the following commands:

python3 src/listenOnSomeOne.py -h

For PCAP analyzer type:

python3 src/process_pcap.py -h
#OR
python3 src/process_pcap.py 

Screenshots

Navigate to the following link to explore the images from the PyPI project. - Screenshots

Educational Purposes

This project is intended for educational purposes only. The code demonstrates how to interact with system commands and network interfaces via Python. Do not use this toolkit for unauthorized or illegal network activities. Always obtain proper authorization before testing network security.

Author

cyb2rS2c - GitHub Profile

License

This project is licensed under the MIT License - see the LICENSE file for details.

Disclaimer!

This code is provided "as-is" without any warranty. The author is not responsible for any misuse or damage caused by the use of this software. Always practice responsible security testing.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

stealth_chopper-4.1.2.tar.gz (20.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

stealth_chopper-4.1.2-py3-none-any.whl (20.8 kB view details)

Uploaded Python 3

File details

Details for the file stealth_chopper-4.1.2.tar.gz.

File metadata

  • Download URL: stealth_chopper-4.1.2.tar.gz
  • Upload date:
  • Size: 20.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.7

File hashes

Hashes for stealth_chopper-4.1.2.tar.gz
Algorithm Hash digest
SHA256 9d3642328e944c29cb0c9431c5cafbc2cc8b02dfdb3bf328e74a211f769961e7
MD5 9564e56621d3481e8ed7b9202ce8772c
BLAKE2b-256 72188133a64dcfb0891c37df5cd1780cf91ce929c14855636160fece648789dc

See more details on using hashes here.

File details

Details for the file stealth_chopper-4.1.2-py3-none-any.whl.

File metadata

File hashes

Hashes for stealth_chopper-4.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 e82920a5abdc3934e176fd0906d3b31a5f0b89e1144b3e80fac71bbf760a9596
MD5 2ae68169aaa530d1bf9164b79b134396
BLAKE2b-256 30cf57d36372d343f956d95e971b25c5102354d33a6917fbc67187f34d6debcc

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page