Saturday, February 22, 2025
HomeWireless AttacksKickThemOut -Tools to Kick Devices out of Your Network and Enjoy all...

KickThemOut -Tools to Kick Devices out of Your Network and Enjoy all the Bandwidth

Published on

SIEM as a Service

Follow Us on Google News

KickThemOut -Tools to kick devices out of your network and enjoy all the bandwidth for yourself.It permits you to choose particular or all gadgets and ARP spoof them off your local area network.

Goal

Difficult to happen when your brother, sister, mother, father and every other person are associated with your network by means of every one of their gadgets.

KickThemOut ARP Spoofs gadgets in your Local Area Network kill their Internet connectivity and in this way permitting you to relish all the network bandwidth capacity for yourself.

KickThemOut  – Installation

KickThemOut is Compatible with Python 2.6 & 2.7.

Debian

You can get kickthemout by cloning the Github repo and install it.

$ git clone https://github.com/k4m4/kickthemout.git
$ cd kickthemout/

KickThemOut - Tools to kick devices out of your network and enjoy all the bandwidth

Mac OS X Installation

To install KickThemOut on a Mac, please run the following:

$ sudo python -m pip install pcapy
$ brew install libdnet scapy nmap

Remember that you may be asked to run some commands executing the previous step.

$ git clone https://github.com/k4m4/kickthemout.git
$ cd kickthemout/
$ sudo python -m pip install -r requirements.txt

NOTE: You need to have Homebrew installed before running the Mac OS installation

Here you can find a Short Demo

KickThemOut -Tools to kick devices out of your network and enjoy all the bandwidth

Disclaimer

KickThemOut is provided as is under the MIT Licence (as stated below). It is built for educational purposes only.

Also Read:

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Responding To And Recovering From Physical Security Breaches

Unfortunately, data breaches and similarly related physical security threats are something of an eventuality...

Hijacker v1.3 – A Complete Wi-Fi Hacking Tool Kit for Android

The hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng,...

Wifi cracker – Pentesting Wifi Network with Fern WiFi Password Auditing Tool

A WiFi cracker is a software tool or program that is designed to exploit...