Skip to content

๐Ÿ”ฅ NetPhantom - Network Phantom Poisoning Authentication Capture Tool

Notifications You must be signed in to change notification settings

ismailtsdln/netphantom

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

11 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ”ฅ NetPhantom Framework

NetPhantom is a modular, production-grade internal network credential interception framework built for high-stability, stealth-aware offensive security operations.

๐Ÿ—๏ธ Architecture

NetPhantom utilizes an asynchronous, event-driven core capable of orchestrating multiple poisoning protocols and authentication handlers simultaneously.

graph TD
    A[Core Engine] --> B[Plugin Manager]
    B --> C[Protocol Plugins]
    B --> D[Auth Handlers]
    C --> C1[LLMNR Plugin]
    C --> C2[NBNS Plugin]
    C --> C3[mDNS Plugin]
    D --> D1[HTTP Auth Handler]
    A --> E[Env Scanner]
    A --> F[Session Manager]
    F --> G[Reporting Engine]
Loading

๐Ÿš€ Key Features

  • Asynchronous Engine: Powered by asyncio for non-blocking network I/O.
  • Environment Awareness: Detects SMB signing, domain context, and IPv6 availability before engagement.
  • Config-Driven: Profile-based execution using YAML templates.
  • Structured Observability: JSON-formatted logging for SIEM integration.
  • Professional Reporting: Auto-generated Markdown reports mapped to MITRE ATT&CK Framework.

๐Ÿ› ๏ธ Getting Started

Prerequisites

  • Python 3.11+
  • Root/Administrator privileges (for raw socket access)

Installation

poetry install

Usage

# Execute with a specific profile
poetry run python -m netphantom.ui.main --profile profile.yaml

# Dry-run for scope validation
poetry run python -m netphantom.ui.main --profile profile.yaml --dry-run

๐Ÿ›ก๏ธ Security & Legal Disclaimer

Caution

FOR AUTHORIZED USE ONLY. Use of NetPhantom is strictly limited to authorized security testing, research, and educational purposes. Unauthorized use against any network without explicit, written permission is strictly prohibited and may violate local and international laws. The authors assume no liability for misuse of this tool.

๐Ÿ“œ MITRE ATT&CK Mapping

  • T1557.001: LLMNR/NBT-NS Poisoning and SMB Relay (Interception)
  • T1557: Adversary-in-the-Middle (Credential Capture)

๐Ÿ“„ License

Licensed under the MIT License.

About

๐Ÿ”ฅ NetPhantom - Network Phantom Poisoning Authentication Capture Tool

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages