Now works to detect bettercap
Usage: ArpAntispoof.pl -i <interface(s)> -c <mac_to_protect>
-i : Listen on specific network interface e.g wlan0. Or 'all' to listen on all interfaces
-c : Mac address of device to protect e.g 90:90:90:90:90:90
-v : Show packet metadata
-V : Show packet metadata and data with optional filter
arpspoof -i wlan0 -t <your-gateway> <your-ip>
then
perl ArpAntispoof.pl -i <interface> -c <mac_to_protect>
Usage: ArpHound.pl
perl ArpHound.pl
Usage: ArpSpy.pl -i <interface(s)> -m <mac_to_attack>
-i : Listen on specific network interface e.g wlan0. Or 'all' to listen on all interfaces
-m : Mac address of device to eavesdrop on e.g 90:90:90:90:90:90
-d : Regex of data to log
-o : File to output data
ArpSpy.pl -i <interface(s)> -m <mac_to_attack>