AnySniff is a tool for monitoring TCP connections of processes like AnyDesk on Windows. It uses the CVE-2024-52940 vulnerability to track open connections and log IPs, ports, and other relevant details.
- Monitors TCP connections of targeted processes (e.g., AnyDesk).
- Logs IP addresses, ports, and process details to a log file.
- Allows real-time sniffing of network traffic.
- Provides a simple menu-driven interface.
- Python 3.x
- Windows operating system
pyfiglet
library for ASCII artcolorama
library for color support
- Clone this repository:
git clone https://github.com/yourusername/AnySniff.git
- Navigate to the project directory:
cd AnySniff
- Install the required dependencies:
pip install -r requirements.txt
- Run the script:
python anysniff.py
- Follow the menu options:
- Start Sniff: Starts sniffing for targeted TCP connections.
- Info: Displays information about the tool and its usage.
- Exit: Exits the program.
- How to sniff?
- After starting the sniffer, connect to any remote machine via AnyDesk and look at the terminal.
All connection details will be logged in the current directory. The logs are saved with filenames that include the timestamp, such as ip_2024-12-02_08-45-00.log
.
- This tool leverages CVE-2024-52940 for monitoring AnyDesk connections.
- Created by MKultra69 with love.
- I don't give a shit why or how.