Skip to main content

Aggressive Sniffer & MITM Launcher

Project description

StealthChopper

Aggressive Sniffer & MITM Launcher

Python Platform License Version


This Python-based tool allows network monitoring professionals and security enthusiasts to quickly launch Ettercap, Bettercap, and Wireshark for packet sniffing and MITM analysis on a selected target IP and interface. It also analyzes PCAP files, filtering packets by URL and/or IP, and displays which domains were visited by a specific IP along with timestamps and visit status.

Features

  1. Custom Packet Filter Generator: Automatically generates and compiles an Ettercap filter file to drop traffic from all IPs except the target.
  2. Wireshark Auto-Launch with Filters: Opens Wireshark with a live display filter for the target IP and optionally filtered domains from url_file.txt.
  3. PCAP Analyzer: This tool allows you to analyze PCAP files and filter packets based on a specific URL and/or IP address. It shows which domains were visited by a particular IP, including timestamps and visit status.

Installation (with pip)

curl -LO https://raw.githubusercontent.com/cyb2rS2c/StealthChopper/refs/heads/main/setup_pip.sh
chmod +x setup_pip.sh; source ./setup_pip.sh

Project Tree

.
├── 192.168.0.121_filtered_activity.pcap
├── assets
├── ├── targets.txt
│   ├── tld.txt
│   └── url_file.txt
├── excluded_ips.ef
├── excluded_ips.efc
├── LICENSE
├── README.md
├── requirements.txt
├── setup.sh
├── setup_pip.sh (optional using pip)
└── src
    ├── animation.py
    ├── common_url.py
    ├── extraction.py
    ├── listenOnSomeOne.py
    ├── recon_scan.py
    ├── process_pcap.py
    └── validation.py

Installation (GitHub)

  1. Clone the repository:
git clone https://github.com/cyb2rS2c/StealthChopper.git
cd StealthChopper
  1. Install the required Python dependencies and run the program (Interactive):
chmod +x setup.sh;source ./setup.sh

Usage

Run the script as root, specifying the target IP and interface as arguments:

Option1 (Manually)

sudo python3 src/listenOnSomeOne.py <target_ip> <interface>

Option2 (Wizard)

sudo python3 src/listenOnSomeOne.py --scan

Option3

sudo python3 src/listenOnSomeOne.py --interactive

Example:

sudo python3 listenOnSomeOne.py 192.168.1.121 wlan0
  • <target_ip>: The single IPv4 address you want to target.
  • <interface>: The network interface to use (e.g., eth0, wlan0).

The script will:

1-Validate your IP and interface input.
2-Ensure url_file.txt exists (generates it via common_url.py if missing).
3-Create a custom filter file excluding all other IPs.
4-Compile the filter file for Ettercap.
5-Launch Ettercap, Bettercap, and Wireshark in separate terminal sessions.
6-Apply a Wireshark filter for target IP and optionally domains from url_file.txt.
Tip: Press Ctrl+C in the main terminal to exit gracefully.

PCAP Analyzer

Usage

python3 src/process_pcap.py -f <pcap_file> -s [filter_url] -i [filter_ip] -c [country] -t [HH:MM:SS | YYYY-MM-DD | YYYY-MM-DD HH:MM:SS]

Example:

1. Check if a user has visited linkedin.com from a specific IP address:

# Check if the user with IP "192.168.1.121" has visited "linkedin.com"
# If so, it will show the visit time and other useful details.
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -s ".*linkedin.com" -i "192.168.1.121"

# Alternatively, you can search for just "linkedin" (without the full domain).
# This will match any domain containing "linkedin" like linkedin.com etc.
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -s "linkedin" -i "192.168.1.121"

2. Check all websites visited by a user with a specific IP address:

# This will display all the domains the user has queried in the PCAP.
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -i "192.168.1.121"

3. Check all users who have visited linkedin.com:

# This will display all users who have visited any domain containing "linkedin".
# It shows the visit status, including the time of visit.
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -s "linkedin"

4. Check users by country:

# This will display all users who have visited any domain containing "linkedin".
# It filters results by country, showing only visits from users in the specified country (e.g., US).
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -s "linkedin" -c "US"

5. Check users by specific visit time:

# This will display all users who visited any domain containing "linkedin" on a specific date and time (e.g., "2025-12-07 13:20:30").
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -s "linkedin" -t "2025-12-07 13:20:30"

6. New Features / Changes

The following columns have been added and can now be filtered:

Vendor - the manufacturer of the device, based on the MAC address.

MAC Address - the device’s network interface identifier.

Hostname - the resolved name of the device.

# Example
python3 src/process_pcap.py -f 192.168.0.121_filtered_activity.pcap -v "Liteon" -H "router" -m "00:00:00:00:00:00"

Tip: Use Regex for domain filtering as shown in the example above if you don't want to enter the full FQDN.

6. Help

To get help on how to use the script, you can view the usage instructions with the following commands:

python3 src/listenOnSomeOne.py -h

For PCAP analyzer type:

python3 src/process_pcap.py -h
#OR
python3 src/process_pcap.py 

Screenshots

Navigate to the following link to explore the images from the PyPI project. - Screenshots

Educational Purposes

This project is intended for educational purposes only. The code demonstrates how to interact with system commands and network interfaces via Python. Do not use this toolkit for unauthorized or illegal network activities. Always obtain proper authorization before testing network security.

Author

cyb2rS2c - GitHub Profile

License

This project is licensed under the MIT License - see the LICENSE file for details.

Disclaimer!

This code is provided "as-is" without any warranty. The author is not responsible for any misuse or damage caused by the use of this software. Always practice responsible security testing.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

stealth_chopper-4.1.5.tar.gz (21.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

stealth_chopper-4.1.5-py3-none-any.whl (23.3 kB view details)

Uploaded Python 3

File details

Details for the file stealth_chopper-4.1.5.tar.gz.

File metadata

  • Download URL: stealth_chopper-4.1.5.tar.gz
  • Upload date:
  • Size: 21.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.12

File hashes

Hashes for stealth_chopper-4.1.5.tar.gz
Algorithm Hash digest
SHA256 3e444ef6bb3d99158f7305f3cb01b0d51249dd865037f20070733d56fbabc051
MD5 9722bc6804389684903aa597e16691bc
BLAKE2b-256 53e9d0c0887d42cc2f8fb20c460afd5f0073eef4411a2f1437ff8fbe86ca13f4

See more details on using hashes here.

File details

Details for the file stealth_chopper-4.1.5-py3-none-any.whl.

File metadata

File hashes

Hashes for stealth_chopper-4.1.5-py3-none-any.whl
Algorithm Hash digest
SHA256 cdfc9875ab3fba2b423b64e4a10b4a438579818ddc0efb7d77744367c616e485
MD5 cc6956a5485929c50074672f726c4c1d
BLAKE2b-256 1753f88f4886e85e7102553764dc6d3d5cf89ca8100083fb2f25e24a2904a10e

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page