NetPhantom is a modular, production-grade internal network credential interception framework built for high-stability, stealth-aware offensive security operations.
NetPhantom utilizes an asynchronous, event-driven core capable of orchestrating multiple poisoning protocols and authentication handlers simultaneously.
graph TD
A[Core Engine] --> B[Plugin Manager]
B --> C[Protocol Plugins]
B --> D[Auth Handlers]
C --> C1[LLMNR Plugin]
C --> C2[NBNS Plugin]
C --> C3[mDNS Plugin]
D --> D1[HTTP Auth Handler]
A --> E[Env Scanner]
A --> F[Session Manager]
F --> G[Reporting Engine]
- Asynchronous Engine: Powered by
asynciofor non-blocking network I/O. - Environment Awareness: Detects SMB signing, domain context, and IPv6 availability before engagement.
- Config-Driven: Profile-based execution using YAML templates.
- Structured Observability: JSON-formatted logging for SIEM integration.
- Professional Reporting: Auto-generated Markdown reports mapped to MITRE ATT&CK Framework.
- Python 3.11+
- Root/Administrator privileges (for raw socket access)
poetry install# Execute with a specific profile
poetry run python -m netphantom.ui.main --profile profile.yaml
# Dry-run for scope validation
poetry run python -m netphantom.ui.main --profile profile.yaml --dry-runCaution
FOR AUTHORIZED USE ONLY. Use of NetPhantom is strictly limited to authorized security testing, research, and educational purposes. Unauthorized use against any network without explicit, written permission is strictly prohibited and may violate local and international laws. The authors assume no liability for misuse of this tool.
- T1557.001: LLMNR/NBT-NS Poisoning and SMB Relay (Interception)
- T1557: Adversary-in-the-Middle (Credential Capture)
Licensed under the MIT License.