________.__ __ _____ ____________________
/ _____/| |__ ____ _______/ |_ / _ \\______ \______ \
/ \ ___| | \ / _ \/ ___/\ __\/ /_\ \| _/| ___/
\ \_\ \ Y ( <_> )___ \ | | / | \ | \| |
\______ /___| /\____/____ > |__| \____|__ /____|_ /|____|
\/ \/ \/ \/ \/
---- Stealth ARP Spoofing Tool ----
===================================================================
𝕍𝕖𝕣𝕤𝕚𝕠𝕟 : 1.0 𝕋𝕨𝕚𝕥𝕥𝕖𝕣 : anishalx7
===================================================================
GhostARP is a powerful yet lightweight ARP spoofing tool, engineered for penetration testers, cybersecurity professionals, and ethical hackers. Designed with efficiency in mind, GhostARP allows users to conduct ARP spoofing attacks with minimal network disruption, enabling detailed traffic analysis and network vulnerability assessments.
By mimicking legitimate ARP packets, GhostARP allows you to reroute network traffic between the target and gateway, effectively performing Man-in-the-Middle (MitM) attacks. Whether for educational purposes or professional security assessments, GhostARP ensures the integrity of your tests by restoring ARP tables once the operation is terminated.
- Stealth Mode: Operates with minimal packet flooding to avoid detection.
- User-Friendly: Simple and intuitive command-line interface for quick usage.
- Auto ARP Restoration: Automatically resets ARP tables after interruption or shutdown.
- Real-Time Packet Count: Displays the number of spoofed packets sent during operation.
- Customizable: Easily adaptable for various network configurations and scenarios.
Ensure the following dependencies are installed:
- Python 3.x
- Scapy (for crafting and sending ARP packets)
- colorama library
-
Clone the repository:
git clone https://github.com/anishalx/ghostarp.git cd ghostarp -
Install the required dependencies:
pip install scapy colorama
-
Run the tool:
python ghostarp.py
After installation, GhostARP can be executed from the terminal. The tool will prompt you for the Target IP and Gateway IP to initiate the ARP spoofing process.
-
Run the Tool
Execute the script with the following command:
python ghostarp.py
-
Input Required Information
- You will be prompted to enter the target IP address.
- Enter the IP address of the gateway.
Ensure that both IPs are valid and reachable on your network.
-
Start Spoofing
The tool will start sending spoofed ARP packets. You will see the count of packets sent in real-time.
-
Stopping the Tool
To stop the tool, press Ctrl + C. The tool will automatically restore the ARP tables for both the target and the gateway.
Target machine
For a detailed list of options and usage instructions, simply run:
python ghostarp.py -hGhostARP is compatible with:
- Windows: Use Command Prompt or PowerShell.
- macOS: Utilize Terminal for seamless execution.
- Linux: Run in any terminal emulator of your choice.
-
Ethical Use: This tool should only be used in environments where you have permission to test. Unauthorized use on networks can lead to legal consequences.
-
Network Impact: ARP spoofing can disrupt network operations; ensure you conduct tests in controlled environments.
We welcome contributions from the community! If you have ideas for improvements or new features, please follow these steps:
- Fork the repository.
- Create a new branch (
git checkout -b feature/YourFeature). - Make your changes and commit them (
git commit -m 'Add some feature'). - Push your branch (
git push origin feature/YourFeature). - Open a pull request.
This project is licensed under the MIT License. See the LICENSE file for details.
- Special thanks to Scapy for powering this tool.
- Inspired by various network scanning tools and the open-source community.

