NetworkSentinel is an advanced real-time network packet analyzer and exploitation framework powered by AI.
It enables live traffic monitoring, AI-based data classification, and automated attacks such as ARP Spoofing and MITM.
- Live Packet Sniffing – Captures network packets in real-time.
- AI-Powered Analysis – Uses machine learning to classify sensitive network traffic.
- CNAME & WHOIS Checks – Identifies misconfigured domains and expired services.
- Cloudflare Protection Detection – Checks if a subdomain is protected by Cloudflare.
- Network Exploitation – Includes ARP Spoofing & MITM attacks for security testing.
- Python 3.x
- Pip & Virtual Environment
- Admin Privileges (for network sniffing & attacks)
Clone the repository and set up the virtual environment:
git clone https://github.com/kdandy/NetworkSentinel.git
cd NetworkSentinel
python3 -m venv .venv
source .venv/bin/activate # On macOS/Linux
.venv\Scripts\activate # On Windows
pip install -r requirements.txt
Run the tool with root privileges for network sniffing:
sudo python3 NetworkSentinel.py
-
Sniff Network Traffic
sudo python3 NetworkSentinel.py
- Captures packets in real-time.
-
Analyze Packets with AI
Inside the program, type:analyze
- AI classifies sensitive packets.
-
Launch ARP Spoofing Attack
Inside the program, type:arp_spoof
- Enter Target IP & Gateway IP for a MITM attack.
-
Exit the Program
exit
🌐 Source IP | 🎯 Destination IP | 🔍 AI Risk Level | |
---|---|---|---|
192.168.1.10 | 192.168.1.1 | TCP | 🔴 High |
192.168.1.12 | 8.8.8.8 | UDP | 🟢 Low |
192.168.1.14 | 192.168.1.100 | TCP | 🟡 Medium |
This tool is intended for educational and security research purposes only.
Unauthorized use on networks you do not own is illegal.
📝 Licensed under the MIT License.