[+] AUTHOR: Yasser Janah
[+] GITHUB: https://github.com/yasserjanah
[+] TWITTER: https://twitter.com/th3x0ne
[+] FACEBOOK: https://fb.com/yasser.janah0
Usage of IZanami Framework for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.
git clone https://github.com/yasserjanah/IZanamiFramework.git
cd IZanamiFramework/
chmod +x arp_spoof.py dns_spoof.py runserver.sh
cd scripts
chmod +x install.sh
./installs.sh
*** Run this commands with root permissions ***
1) run ARP Spoofing attack :
$ ./arp_spoof.py -t <TARGET OR TARGET(s) SEPARATED By ',' OR The WHOLE NETWORK (example: 192.168.1.0/24)> -g <GATEWAY> -i <INTERFACE>
2) configure config/dns.conf :
$ nano config/dns.conf
""" example of content of this file """
[google.com]
ip = <YOUR_IP OR THE_IP_WHO_YOU_WANT_TO_REDIRECT_CLIENT_TO>
rule = O ==> Only This Domain OR AS ==> All Subdomain
3) run DNS Spoofing attack :
$ ./dns_spoof.py
4) run web server :
$ ./runserver.sh
DEMO Video Soon