-
-
Notifications
You must be signed in to change notification settings - Fork 580
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DNSWatch - DNS Traffic Sniffer and Analyzer #4003
Comments
@HalilDeniz , thank you - have you considered creating a pull request (PR) instead of spending time on writing a lengthy description for this tool? For "tool requests," a concise description along with a link to the relevant URL is typically sufficient. Just a friendly suggestion. |
That's copy pasta from upstream README but yeah @HalilDeniz you can take a look at https://wiki.archlinux.org/title/PKGBUILD and https://github.com/BlackArch/blackarch-pkgbuilds and come with a Merge Request if you wouldl like. |
@HalilDeniz solve this HalilDeniz/DNSWatch#17 |
Packaged |
DNSWatch - DNS Traffic Sniffer and Analyzer
DNSWatch is a Python-based tool that allows you to sniff and analyze DNS (Domain Name System) traffic on your network. It listens to DNS requests and responses and provides insights into the DNS activity.
Features
link of the DNSWatch
Usage
-i
,--interface
: Specify the network interface (e.g., eth0).-v
,--verbose
: Use this flag for more verbose output.-o
,--output
: Specify the filename to save results.-t
,--target-ip
: Specify a specific target IP address to monitor.-adt
,--analyze-dns-types
: Analyze DNS types.--doh
: Use DNS over HTTPS (DoH) for resolving DNS requests.-fd
,--target-domains
: Filter DNS requests by specified domains.-d
,--database
: Enable database storage for DNS requests.-p
,--pcap
: Save captured packets to a .pcap filePress
Ctrl+C
to stop the sniffing process.The text was updated successfully, but these errors were encountered: