Share
## https://sploitus.com/exploit?id=0C6D8F58-A75D-5636-974E-546CF16BDF09
# 💀AnySniff
![WindowsTerminal_EXgGPGWIwz_transparent](https://github.com/user-attachments/assets/cd05cce0-60c9-4f02-a5e1-4d51f5b2b25b)


AnySniff is a tool for monitoring TCP connections of processes like AnyDesk on Windows. It uses the CVE-2024-52940 vulnerability to track open connections and log IPs, ports, and other relevant details.

## ⚙Features

- Monitors TCP connections of targeted processes (e.g., AnyDesk).
- Logs IP addresses, ports, and process details to a log file.
- Allows real-time sniffing of network traffic.
- Provides a simple menu-driven interface.

## 💽Requirements

- Python 3.x
- Windows operating system
- `pyfiglet` library for ASCII art
- `colorama` library for color support

## 🛠️Installation

1. Clone this repository:
    ```bash
    git clone https://github.com/yourusername/AnySniff.git
    ```
2. Navigate to the project directory:
    ```bash
    cd AnySniff
    ```
3. Install the required dependencies:
    ```bash
    pip install -r requirements.txt
    ```

## 🍴Usage

1. Run the script:
    ```bash
    python anysniff.py
    ```
2. Follow the menu options:
    - **Start Sniff**: Starts sniffing for targeted TCP connections.
    - **Info**: Displays information about the tool and its usage.
    - **Exit**: Exits the program.
3. How to sniff?
    - After starting the sniffer, connect to any remote machine via AnyDesk and look at the terminal.
### **Enjoy!**

## 📄Logs

All connection details will be logged in the current directory. The logs are saved with filenames that include the timestamp, such as `ip_2024-12-02_08-45-00.log`.

## 💊Acknowledgements

- This tool leverages CVE-2024-52940 for monitoring AnyDesk connections.
- Created by MKultra69 with love.

## ❓P.S

- I don't give a shit why or how.