SkillAgentSearch skills...

Netcut

Python3 netcut utility

Install / Use

/learn @paasshme/Netcut
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Installation

With python3 and pip:

Linux :

install the deps
$ pip install -r requirements.txt
launch the server with su permissions (required)
$ sudo python serv.py

Using a python3 virtual environment (venv) :

Create a venv and activate it

$ python -m venv venv
$ . venv/bin/activate

Install the deps

$ pip install -r requirements.txt

Launch the server with su permissions (required)

$ sudo python serv.py

Documentation

use '-s' or '--server' parameter to lauch the program in server mode and communicate with websocket, otherwise the program wil be launched in standalone mode </br>

The server use json through websockets to communicate with the client : </br> ["command", "arg1", "arg2", [...]] </br> You can find an instance of a python client in testClient.py

Here are the request that the server currently recognize :

  • nmap_scan

    Return IP of every connected device using nmap

    args

    1. (optional) network adress with cidr notation
      default to "192.168.0.0/24"

    returns the list of local devices ip

    example : ["192.168.0.11", "192.168.0.21", "192.168.0.23"]

  • arp_scan

    Return IP & Mac of every connected client, faster than a nmap scan but less reliable

    args

    1. (optional) network adress with cidr notation
      default to "192.168.0.0/24"

    returns the list of local devices ip and mac

    example : [{"ip": "192.168.0.33", "mac": "70:85:c2:83:00:70"}, {"ip": "192.168.0.41", "mac": "68:a3:78:50:67:8a"}, {"ip": "192.168.0.22", "mac": "20:47:da:28:8c:51"}]

  • arp_spoof

    launch an arp spoofing attaque

    args

    1. target's ip (required)
    2. gateway's ip (optional)
      default to "192.168.0.254"
  • sniff

    work in progress

    sniff the packet of the target and send them to the gateway

    args

    1. target's ip (required)
    2. gateway's ip (optional)
      default to "192.168.0.254"
  • set_gateway

    change the default gateway's value

    args

    1. gateway's ip (required)
      example "192.168.0.254"
  • spoof_stop

    stop the spoofing of a specific adress

    args

    1. target's ip (required)
  • sniff_stop

    stop the sniffing of a specific adress

    args

    1. target's ip (required)
  • get_spoofed

    return the ip of the devices getting spoofed

  • get_sniffed

    return the ip of the devices getting sniffed

View on GitHub
GitHub Stars6
CategoryDevelopment
Updated3mo ago
Forks0

Languages

Python

Security Score

72/100

Audited on Dec 9, 2025

No findings