Original author(s) | Philippe Biondi[1] |
---|---|
Developer(s) | Philippe Biondi, Guillaume Valadon, Pierre Lalet, Gabriel Potter[1] |
Stable release | 2.5.0
/ 25 December 2022[2] |
Repository | |
Written in | Python |
Operating system | Cross-platform. See Scapy packaging |
Type | Packet generator Packet analyzer |
License | GPLv2 |
Website | scapy |
Scapy is a packet manipulation tool for computer networks,[3][4] originally written in Python by Philippe Biondi. It can forge or decode packets, send them on the wire, capture them, and match requests and replies. It can also handle tasks like scanning, tracerouting, probing, unit tests, attacks, and network discovery.
Scapy provides a Python interface into libpcap or native raw sockets, in a similar way to that in which Wireshark provides a view and capture GUI. It differs by supporting packet injection, custom packet formats and scripting. While it is a command-line only tool, it can still interface with a number of other programs to provide visualisation including Wireshark, GnuPlot for providing graphs, graphviz or VPython for interactive displaying, etc.
Starting with 2.4.0, Scapy supports Python 2.7 and 3.4+. It must not be confused with "scapy3k" (now renamed Kamene), which is an outdated independent and unmaintained fork.
References
- 1 2 "Credits". Scapy Project. Retrieved 11 January 2019 – via Read the Docs.
- ↑ "Releases - secdev/scapy". Retrieved 2 April 2021 – via GitHub.
- ↑ Gift, Noah; Jones, Jeremy M. (2008). Python for Unix and Linux System Administration. O'Reilly Media. pp. 173–176. ISBN 978-0-596-51582-9.
- ↑ Dwivedi, Himanshu; Clark, Chris; Thiel, David (2010). Mobile Application Security. McGraw-Hill. p. 384. ISBN 978-0-07-163356-7.
External links