Scapy
Scapy is a packet manipulation tool for computer networks,[3][4] originally written in Python by Philippe Biondi. It can forge or decode packets, send them on the wire, capture them, and match requests and replies. It can also handle tasks like scanning, tracerouting, probing, unit tests, attacks, and network discovery.
Original author(s) | Philippe Biondi[1] |
---|---|
Developer(s) | Philippe Biondi, Guillaume Valadon, Pierre Lalet, Gabriel Potter[1] |
Stable release | 2.4.3
/ 6 August 2019[2] |
Preview release | 2.4.4rc1
|
Repository | |
Written in | Python |
Operating system | Cross-platform. See Scapy packaging |
Type | Packet generator Packet analyzer |
License | GPLv2+ |
Website | scapy |
Scapy provides a Python interface into libpcap or native raw sockets, in a similar way to that in which Wireshark provides a view and capture GUI. It differs by supporting packet injection, custom packet formats and scripting. While it is a command-line only tool, it can still interface with a number of other programs to provide visualisation including Wireshark, GnuPlot for providing graphs, graphviz or VPython for interactive displaying, etc.
Scapy's source code is available under GPLv2 on GitHub and its documentation is hosted on ReadTheDocs.
Starting with 2.4.0, Scapy supports Python 2.7 and 3.4+. It must not be confused with "scapy3k" (now renamed Kamene), which is an outdated independent and unmaintained fork.
References
- "Credits". Scapy Project. Retrieved 11 January 2019 – via Read the Docs.
- "Releases - secdev/scapy". Retrieved 7 August 2019 – via GitHub.
- Gift, Noah; Jones, Jeremy M. (2008). Python for Unix and Linux System Administration. O'Reilly Media. pp. 173–176. ISBN 978-0-596-51582-9.
- Dwivedi, Himanshu; Clark, Chris; Thiel, David (2010). Mobile Application Security. McGraw-Hill. p. 384. ISBN 978-0-07-163356-7.