Metadata-Version: 2.1
Name: scapy_unroot
Version: 0.1.1a1
Summary: Daemon and tooling to enable using scapy without root.
Home-page: https://github.com/miri64/scapy-unroot
Author: Martine S. Lenders
Author-email: m.lenders@fu-berlin.de
License: UNKNOWN
Description: [![Supported Python versions]](https://pypi.org/scapy-unroot)
        [![PyPI version]](https://badge.fury.io/py/scapy-unroot)
        [![Build Status]](https://travis-ci.com/miri64/scapy_unroot)
        [![codecov]](https://codecov.io/gh/miri64/scapy_unroot)
        
        [PyPI version]: https://badge.fury.io/py/scapy-unroot.svg
        [Supported Python versions]: https://img.shields.io/pypi/pyversions/scapy-unroot.svg
        [Build Status]: https://travis-ci.com/miri64/scapy_unroot.svg?branch=master
        [codecov]: https://codecov.io/gh/miri64/scapy_unroot/branch/master/graph/badge.svg
        
        # scapy-unroot
        Daemon and tooling to enable using scapy without root.
        
        ## Installation
        `scapy_unroot` can be installed by just running
        
        ```sh
        ./setup.py install
        ```
        
        The requirements also installed by this are listed in
        [`requirements.txt`](./requirements.txt).
        
        ## Usage
        ### The `scapy-unroot` daemon
        The daemon to allow usage of scapy without root requires root itself. You can
        start it with the following command:
        
        ```sh
        sudo scapy-unroot scapy
        ```
        
        The provided argument `scapy` should be a permission group, users who are
        allowed to use scapy without root should be in.
        
        By default, all files related to `scapy_unroot` are managed in the directory
        `/var/run/scapy-unroot`. You can change that directory using the `-r` /
        `--run-dir` argument:
        
        ```sh
        sudo scapy-unroot --run-dir /tmp scapy
        ```
        
        Network interfaces that users of `scapy_unroot` should not be able to send over
        or sniff on can be blacklisted using the `-b` / `--interface-blacklist`
        argument. Multiple interfaces can be provided:
        
        ```sh
        sudo scapy-unroot scapy --interface-blacklist wlan0 eth0 lo
        ```
        
        To run the daemon in background, use the `-d` / `--daemonize` parameter:
        
        ```sh
        sudo scapy-unroot -d scapy
        ```
        
        To get more information on the arguments of the `scapy-unroot` daemon, run
        
        ```sh
        sudo scapy-unroot -h
        ```
        
        All arguments described above can be combined.
        
Keywords: network
Platform: UNKNOWN
Classifier: Development Status :: 2 - Pre-Alpha
Classifier: Intended Audience :: Developers
Classifier: Intended Audience :: Information Technology
Classifier: Intended Audience :: Science/Research
Classifier: Intended Audience :: System Administrators
Classifier: Intended Audience :: Telecommunications Industry
Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3 :: Only
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: 3.7
Classifier: Programming Language :: Python :: 3.8
Classifier: Topic :: Software Development :: Libraries :: Python Modules
Classifier: Topic :: Utilities
Requires-Python: >=3.6
Description-Content-Type: text/markdown
