AirpyDump : Analyse Wireless Packets On The Fly

AirpyDump is a wireless packet analyzer, providing the interface most likely that of airodump-ng from aircrack suite. It currently provides three working modes which are Reader, Stealth and Live.

Reader Mode is used to read a written captured file earlier either with airodump, wireshark or airpydump itself. Stealth mode is used when you are on a run and don’t want to see the live traffic but just on the end of your run.

So, that you could press CTRL+C at the end of your run and captured packets will be displayed to you. Live mode which is not fully build yet, actually utilize curses library from python which have some problems until now, prints live packets i.e. as soon as they’ve captured by the wireless adapter.

The problem with Live Mode is with resizing the terminal. So, don’t try to maximize or restore the screen while live sniffing or else your terminal will be messed up. The only way then you have to get rid of it is forcibly shut it down and then spawn a new terminal again.

Also Read – SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access

MODES

READER MODE: python airpydump.py -r [/path/to/.cap/file]
STEALTH MODE: python airpydump.py -i [Monitor Interface] –live
LIVE MODE: python airpydump.py -i [Monitor Interface] –live –curses

USAGE

[usage] python airpydump.py [arguments]

ARGUMENTS

-h, –help prints help manual
-i, –interface= Monitor Mode Interface to use
-r, –read= Read a captured file earlier, e.g. packets.cap
-w, –write= Write packets to a file.
-c, –curses Utilize curses library to print live packets
-i, –live Must be used for stealth and live modes

UPDATE

Terminal Error Resizing while Live sniffing

R K

Recent Posts

LitterBox : The Ultimate Sandbox Environment For Malware Testing And Red Team Operations

Your malware's favorite sandbox - where red teamers come to bury their payloads. A sandbox…

2 days ago

RWX_MEMORY_HUNT_AND_INJECTION_DV : Exploiting OneDrive.exe To Inject Shellcode Without New RWX Allocations

Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new…

2 days ago

Heap Exploitation Training : A Comprehensive Guide From Basics To Advanced Techniques

This article delves into our comprehensive training program designed to teach you the intricacies of…

2 days ago

BloodHound.py : Installation, Usage, And Features

BloodHound.py is a Python based ingestor for BloodHound, based on Impacket. The code in this…

2 days ago

100 Days Of Rust 2025 : From Incident Response To Linux System Programming

In 2025 I wanted to try something new. In addition to a traditional 100 days…

5 days ago

Presenterm : Revolutionizing Terminal-Based Presentations With Markdown

presenterm lets you create presentations in markdown format and run them from your terminal, with…

5 days ago