Categories: Wireless Attacks

KickThemOut -Tools to Kick Devices out of Your Network and Enjoy all the Bandwidth

KickThemOut -Tools to kick devices out of your network and enjoy all the bandwidth for yourself.It permits you to choose particular or all gadgets and ARP spoof them off your local area network.

Goal

Difficult to happen when your brother, sister, mother, father and every other person are associated with your network by means of every one of their gadgets.

KickThemOut ARP Spoofs gadgets in your Local Area Network kill their Internet connectivity and in this way permitting you to relish all the network bandwidth capacity for yourself.

KickThemOut  – Installation

KickThemOut is Compatible with Python 2.6 & 2.7.

Debian

You can get kickthemout by cloning the Github repo and install it.

$ git clone https://github.com/k4m4/kickthemout.git
$ cd kickthemout/

Mac OS X Installation

To install KickThemOut on a Mac, please run the following:

$ sudo python -m pip install pcapy
$ brew install libdnet scapy nmap

Remember that you may be asked to run some commands executing the previous step.

$ git clone https://github.com/k4m4/kickthemout.git
$ cd kickthemout/
$ sudo python -m pip install -r requirements.txt

NOTE: You need to have Homebrew installed before running the Mac OS installation

Here you can find a Short Demo

Disclaimer

KickThemOut is provided as is under the MIT Licence (as stated below). It is built for educational purposes only.

Also Read:

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

1 day ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

1 day ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

1 day ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

1 day ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

1 day ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

2 days ago