A Python-based multi-functional network utility tool designed for penetration testers, security enthusiasts, and IT professionals. The script includes features for port scanning, network sniffing, WordPress vulnerability discovery, and directory brute-forcing.
-
Nmap Port Scanning
Quickly scan open ports and services on a target system using Nmap's Python bindings. -
Network Sniffing
Capture and display live network traffic from a specified interface using Scapy. -
WordPress Vulnerability Scanning
Detect common WordPress vulnerabilities by checking standard endpoints. -
Directory Brute Forcing
Perform directory brute force attacks on a target web server using a customizable wordlist.
This script relies on several Python libraries. Install the required dependencies using pip
:
pip install nmap scapy requests
-
Clone the repository:
git clone https://github.com/yourusername/networkscanner.git cd networkscanner
-
Make the script executable:
chmod +x networkscanner.py
-
Run the script:
python networkscanner.py
The script presents an interactive menu:
============================================
[1] Nmap Port Scanning
[2] Network Sniffing (Scapy)
[3] WordPress Vulnerability Scanning
[4] Directory Brute Forcing
[0] Exit
============================================
Enter the target IP or domain to scan. Example:
Target IP or Domain: 192.168.1.1
Specify the network interface (e.g., eth0
, wlan0
) to capture packets. It captures 10 packets by default.
Enter the target WordPress site URL. Example:
Target WordPress site: http://example.com
Provide the target site URL and a wordlist file. Example:
Target site: http://example.com
Wordlist path: /path/to/wordlist.txt
Threads (recommended: 5): 5
- Educational Use Only: This tool is intended for learning and authorized testing purposes. Unauthorized use against systems without explicit consent is illegal.
- Secure Your System: Test in isolated or controlled environments to avoid unintended consequences.
This project was created by UMUTKAYA for ZZCODEOFFICIAL.
This project is licensed under the MIT License. See the LICENSE
file for details.
Feel free to submit issues or feature requests via the GitHub Issues page. Contributions are welcome!