NetHawkAnalyzer


NameNetHawkAnalyzer JSON
Version 0.1.10 PyPI version JSON
download
home_pagehttps://github.com/sergio11/nethawk_analyzer
Summary🔍💻 NetHawkAnalyzer: An advanced AI-powered tool for ethical hacking, cybersecurity network analysis, and vulnerability assessment. 🦅✨
upload_time2024-10-12 11:33:25
maintainerNone
docs_urlNone
authorSergio Sánchez Sánchez
requires_python<4,>=3.7
licenseNone
keywords cybersecurity ethical hacking network analysis vulnerability assessment ai scapy nmap python information security security auditing
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # NetHawk 🦅: AI-Powered Ethical Hacking & Network Vulnerability Assessment 🔍💻🛡️🌐

NetHawk is an advanced, AI-powered tool designed for ethical hacking and comprehensive network vulnerability assessment. Built for cybersecurity professionals, network administrators, and ethical hackers, NetHawk utilizes powerful tools like Scapy and Nmap to perform deep scans, analyze network security, and uncover potential vulnerabilities in target systems.

[![GitHub](https://img.shields.io/badge/GitHub-View%20on%20GitHub-blue?style=flat-square)](https://github.com/sergio11/nethawk_analyzer)
[![PyPI](https://img.shields.io/pypi/v/VehicleDetectionTracker.svg?style=flat-square)](https://pypi.org/project/NetHawkAnalyzer/)
[![License](https://img.shields.io/badge/License-MIT-yellow.svg?style=flat-square)](https://github.com/sergio11/nethawk_analyzer/blob/main/LICENSE)

Thanks to AI-driven automation and intelligent decision-making, NetHawk simplifies port scanning, vulnerability detection, and report generation, making security audits faster, smarter, and more efficient.

🙏 I would like to express my sincere gratitude to [Santiago Hernández, a leading expert in Cybersecurity and Artificial Intelligence](https://www.udemy.com/user/shramos/). His outstanding course on **Cybersecurity and Ethical Hacking**, available on Udemy, was instrumental in the development of this project. The insights and techniques I gained from his course were invaluable in guiding my approach to cybersecurity practices. Thank you for sharing your knowledge and expertise!

🔒 **Disclaimer**: This tool is designed for educational and research purposes. Misuse of this tool could result in violation of laws and regulations. Please use responsibly.

<p align="center">
  <img src="https://img.shields.io/badge/langchain-1C3C3C?style=for-the-badge&logo=langchain&logoColor=white" />
  <img src="https://img.shields.io/badge/Kali_Linux-557C94?style=for-the-badge&logo=kali-linux&logoColor=white" />
  <img src="https://img.shields.io/badge/Python-FFD43B?style=for-the-badge&logo=python&logoColor=blue" />
</p>

<p align="center">
  <img src="doc/screenshots/picture_1.PNG" />
</p>

## 🌟 Key Features:

- 🔧 **Multi-Tool Scanning**: Combines the power of Scapy and Nmap to conduct in-depth network scans, ensuring a comprehensive view of network activity and vulnerabilities.
  
- 🚪 **Aggressive and Comprehensive Port Scanning**: Supports TCP, UDP, and Xmas scans to detect open, closed, and filtered ports, identifying potential entry points for attackers.

- 📊 **Result Consolidation**: Merges scan results from both tools to eliminate duplicates, providing a clear and consolidated view of your network's security status.

- ⚡ **High Concurrency**: Efficiently scans wide ranges of ports using multiple threads, allowing for fast and scalable performance for networks of any size.

- ⏱️ **Customizable Settings**: Configure parameters and timeouts according to your network conditions and security requirements.

- 🤖 **AI-Powered Analysis**: Offers smarter vulnerability analysis with actionable insights, helping you take appropriate measures based on findings.

## 🎯 Use Cases:

- 🔓 **Penetration Testing**: Ethical hackers can quickly identify exploitable vulnerabilities in networks, strengthening defenses before malicious actors can attack.

- 🔍 **Network Security Auditing**: IT teams can use NetHawk to audit network security, scanning for open ports, misconfigured services, and hidden vulnerabilities.

## 🔍 Host and Port Scanning Strategy:

NetHawk employs an efficient combination of Scapy and Nmap to perform host and port scanning, providing comprehensive and redundant coverage, ensuring maximum detection of active hosts and open ports, even in networks with firewall defenses.

### 1. **Host Detection with Scapy**:

- **ICMP Ping**: First, NetHawk uses ICMP packets (ping) sent to each host within the target network range to check their availability. If a host responds, it is considered "active."

- **TCP SYN and ACK Scanning**: For hosts that do not respond to the ping, NetHawk performs a TCP SYN scan, sending SYN packets to the most common ports (80, 443, 22, etc.) to identify responses indicating open ports. If no response is received for the SYN, an ACK scan is attempted to determine if the host is responding to TCP packets.

- **Fallback to Socket Scan**: If the previous scans fail (possibly due to firewalls blocking ICMP or SYN packets), a direct connection attempt is made using sockets on the same ports, looking for any response that may indicate an open port.

### 2. **Port Scanning with Scapy and Nmap**:

- **Scapy**: For hosts identified as active, NetHawk uses Scapy to perform deep port scans. Various scan types are supported, including:
  - **TCP SYN**: Sending SYN packets to discover open ports.
  - **UDP Scan**: Using UDP packets to detect open or filtered ports.
  - **Xmas Scan**: Scanning with malformed TCP packets to test for anomalous responses that may indicate filtered or closed ports.

- **Nmap**: NetHawk complements Scapy's results with an Nmap scan, providing additional detection capabilities such as identifying service versions and checking less common ports. Nmap is run by default to scan the most commonly used ports or can be configured for custom scans based on specific security requirements.

- The results from Nmap are consolidated with those from Scapy, eliminating duplicates to offer a clear and detailed final report.

### 3. **Aggregation and Analysis of Results**:

NetHawk combines the results from both scans (Scapy and Nmap) to generate a complete list of active hosts and open ports. By merging results from different approaches, duplication is eliminated, providing a unique view of potential network vulnerabilities. With this combination of techniques, NetHawk ensures complete coverage, detecting hosts and open ports that may be hidden from more conventional scanning methods.

## 🌐 Using the NetHawk API

NetHawk provides a powerful and simplified API for conducting security analyses and network scans. This API abstracts the complexity of using tools like Scapy and Nmap, allowing users to interact with various scanning and vulnerability analysis functions efficiently. Below is a guide to its main methods and functionalities:

#### 1. 🚀 **Initialization (`__init__`)**

The main object of the API is the `NetHawkAnalyzer` class. To get started, you need to provide a network range (`network_range`) and other optional parameters like timeout (`timeout`) and an AI API key if necessary.

- **`network_range`**: The range of IP addresses to scan (e.g., `192.168.1.0/24`).
- **`timeout`**: Timeout in seconds.
- **`groq_api_key`** and **`model_id`**: Optional keys for integration with AI services.

#### 2. 🔍 **Host Scanning (`scan_hosts`)**

This method detects active devices on the network, supporting the following scanning methods:

- **`arp`**: Fast, based on ARP, but limited to local networks.
- **`scapy`**: More advanced scanning that can detect hosts through firewalls.

The result is a list of active hosts ready for the next step.

#### 3. 🚪 **Port Scanning (`scan_ports` and `scan_all_ports`)**

NetHawk scans ports using various techniques to detect open ports:

- **TCP SYN**: Detects open TCP ports.
- **UDP Scan**: Scans for open or filtered UDP ports.
- **Xmas Scan**: Uses malformed packets to identify filtered ports.

The **`scan_all_ports`** method runs all scan types simultaneously to provide a comprehensive view of open ports on each host.

#### 4. 🛠️ **Service Detection (`scan_services`)**

NetHawk allows the identification of services running on open ports and retrieves banner information:

- **`scan_services`**: Scans a list of hosts to detect services and versions, which is crucial for identifying potential vulnerabilities.

#### 5. 📁 **SMB Share Scanning (`scan_smb_shares`)**

You can also scan hosts for public SMB shares:

- **`scan_smb_shares`**: Detects shared resources via SMB, helping identify unauthorized access points in the network.

#### 6. 📝 **Full Network Scan (`run_full_scan`)**

For a comprehensive analysis, use the **`run_full_scan`** method, which combines all scanning functionalities into a single operation:

- This method performs host discovery, port scanning, service detection, and SMB share enumeration.
- Results can be output in both PDF and JSON formats for detailed reporting and analysis.

### ⚠️ **Error Handling**

The API raises specific errors for known issues, such as:

- **`ValueError`**: Raised for unknown scanning methods.
- Proper error handling ensures users are informed of any issues during the scanning process.

## 🖼️ Tool Screenshots

In this section, we showcase various screenshots of **NetHawk** in action. These visuals illustrate the user interface, scanning processes, and results generated by our AI-powered ethical hacking and network vulnerability assessment tool. Each screenshot highlights the key features and functionalities, providing an insight into how **NetHawk** simplifies the auditing of network security.

Explore the following images to see how **NetHawk** works and the valuable information it can uncover for cybersecurity professionals, network administrators, and ethical hackers alike!


<p align="center">
  <img src="doc/screenshots/picture_1.PNG" />
</p>

<p align="center">
  <img src="doc/screenshots/picture_2.PNG" />
</p>

<p align="center">
  <img src="doc/screenshots/picture_3.PNG" />
</p>

<p align="center">
  <img src="doc/screenshots/picture_4.PNG" />
</p>

<p align="center">
  <img src="doc/screenshots/picture_5.PNG" />
</p>

<p align="center">
  <img src="doc/screenshots/picture_6.PNG" />
</p>

<p align="center">
  <img src="doc/screenshots/picture_7.PNG" />
</p>

## 📦 Required Dependencies

| Dependency              | Version    | Description                                                                                   |
|-------------------------|------------|-----------------------------------------------------------------------------------------------|
| **scapy**               | `2.6.0`   | A powerful Python library used for network packet manipulation and analysis.                 |
| **tqdm**                | `4.65.0`   | A fast, extensible progress bar for loops and file processing.                               |
| **rich**                | `13.9.2`  | A library for rich text and beautiful formatting in the terminal.                             |
| **pysmb**               | `1.2.10`  | A Python implementation of the SMB/CIFS protocol for network file sharing.                    |
| **python3-nmap**       | `1.9.1`   | A Python library that allows you to interact with Nmap from your Python scripts.            |
| **langchain**           | `0.2.16`  | A framework for building applications with language models and AI capabilities.               |
| **langchain-groq**      | `0.1.10`  | An extension for Langchain that enables integration with Groq-based systems.                  |
| **fpdf2**               | `2.8.1`   | A library for generating PDF documents using Python.                                         |
| **python-dotenv**       | `1.0.1`   | A tool to read key-value pairs from a `.env` file and set them as environment variables.     |

## Acknowledgements 🙏

🙏 I would like to express my sincere gratitude to [Santiago Hernández, a leading expert in Cybersecurity and Artificial Intelligence](https://www.udemy.com/user/shramos/). His outstanding course on **Cybersecurity and Ethical Hacking**, available on Udemy, was instrumental in the development of this project. The insights and techniques I gained from his course were invaluable in guiding my approach to cybersecurity practices. Thank you for sharing your knowledge and expertise!

## 🤝 **Contributing**
Contributions to NetHawk are highly encouraged! If you're interested in adding new features, resolving bugs, or enhancing the project's functionality, please feel free to submit pull requests.

## Get in Touch 📬

NetHawk is developed and maintained by **Sergio Sánchez Sánchez** (Dream Software). Special thanks to the open-source community and the contributors who have made this project possible. If you have any questions, feedback, or suggestions, feel free to reach out at  [dreamsoftware92@gmail.com](mailto:dreamsoftware92@gmail.com).

## Visitors Count

<img width="auto" src="https://profile-counter.glitch.me/nethawk_analyzer/count.svg" />
 
 ## Please Share & Star the repository to keep me motivated.
  <a href = "https://github.com/sergio11/nethawk_analyzer/stargazers">
     <img src = "https://img.shields.io/github/stars/sergio11/nethawk_analyzer" />
  </a>


[![GitHub](https://img.shields.io/badge/GitHub-View%20on%20GitHub-blue?style=flat-square)](https://github.com/sergio11/nethawk_analyzer)
[![PyPI](https://img.shields.io/pypi/v/VehicleDetectionTracker.svg?style=flat-square)](https://pypi.org/project/NetHawkAnalyzer/)

## License ⚖️

This project is licensed under the MIT License, an open-source software license that allows developers to freely use, copy, modify, and distribute the software. 🛠️ This includes use in both personal and commercial projects, with the only requirement being that the original copyright notice is retained. 📄

Please note the following limitations:

- The software is provided "as is", without any warranties, express or implied. 🚫🛡️
- If you distribute the software, whether in original or modified form, you must include the original copyright notice and license. 📑
- The license allows for commercial use, but you cannot claim ownership over the software itself. 🏷️

The goal of this license is to maximize freedom for developers while maintaining recognition for the original creators.

```
MIT License

Copyright (c) 2024 Dream software - Sergio Sánchez 

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
```

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/sergio11/nethawk_analyzer",
    "name": "NetHawkAnalyzer",
    "maintainer": null,
    "docs_url": null,
    "requires_python": "<4,>=3.7",
    "maintainer_email": null,
    "keywords": "cybersecurity, ethical hacking, network analysis, vulnerability assessment, AI, Scapy, Nmap, Python, information security, security auditing",
    "author": "Sergio S\u00e1nchez S\u00e1nchez",
    "author_email": "dreamsoftware92@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/e5/2d/8ecee78c4599e5fbbdaffc7a270de053d8933c0343fc1f57c8f4848781ce/NetHawkAnalyzer-0.1.10.tar.gz",
    "platform": null,
    "description": "# NetHawk \ud83e\udd85: AI-Powered Ethical Hacking & Network Vulnerability Assessment \ud83d\udd0d\ud83d\udcbb\ud83d\udee1\ufe0f\ud83c\udf10\r\n\r\nNetHawk is an advanced, AI-powered tool designed for ethical hacking and comprehensive network vulnerability assessment. Built for cybersecurity professionals, network administrators, and ethical hackers, NetHawk utilizes powerful tools like Scapy and Nmap to perform deep scans, analyze network security, and uncover potential vulnerabilities in target systems.\r\n\r\n[![GitHub](https://img.shields.io/badge/GitHub-View%20on%20GitHub-blue?style=flat-square)](https://github.com/sergio11/nethawk_analyzer)\r\n[![PyPI](https://img.shields.io/pypi/v/VehicleDetectionTracker.svg?style=flat-square)](https://pypi.org/project/NetHawkAnalyzer/)\r\n[![License](https://img.shields.io/badge/License-MIT-yellow.svg?style=flat-square)](https://github.com/sergio11/nethawk_analyzer/blob/main/LICENSE)\r\n\r\nThanks to AI-driven automation and intelligent decision-making, NetHawk simplifies port scanning, vulnerability detection, and report generation, making security audits faster, smarter, and more efficient.\r\n\r\n\ud83d\ude4f I would like to express my sincere gratitude to [Santiago Hern\u00e1ndez, a leading expert in Cybersecurity and Artificial Intelligence](https://www.udemy.com/user/shramos/). His outstanding course on **Cybersecurity and Ethical Hacking**, available on Udemy, was instrumental in the development of this project. The insights and techniques I gained from his course were invaluable in guiding my approach to cybersecurity practices. Thank you for sharing your knowledge and expertise!\r\n\r\n\ud83d\udd12 **Disclaimer**: This tool is designed for educational and research purposes. Misuse of this tool could result in violation of laws and regulations. Please use responsibly.\r\n\r\n<p align=\"center\">\r\n  <img src=\"https://img.shields.io/badge/langchain-1C3C3C?style=for-the-badge&logo=langchain&logoColor=white\" />\r\n  <img src=\"https://img.shields.io/badge/Kali_Linux-557C94?style=for-the-badge&logo=kali-linux&logoColor=white\" />\r\n  <img src=\"https://img.shields.io/badge/Python-FFD43B?style=for-the-badge&logo=python&logoColor=blue\" />\r\n</p>\r\n\r\n<p align=\"center\">\r\n  <img src=\"doc/screenshots/picture_1.PNG\" />\r\n</p>\r\n\r\n## \ud83c\udf1f Key Features:\r\n\r\n- \ud83d\udd27 **Multi-Tool Scanning**: Combines the power of Scapy and Nmap to conduct in-depth network scans, ensuring a comprehensive view of network activity and vulnerabilities.\r\n  \r\n- \ud83d\udeaa **Aggressive and Comprehensive Port Scanning**: Supports TCP, UDP, and Xmas scans to detect open, closed, and filtered ports, identifying potential entry points for attackers.\r\n\r\n- \ud83d\udcca **Result Consolidation**: Merges scan results from both tools to eliminate duplicates, providing a clear and consolidated view of your network's security status.\r\n\r\n- \u26a1 **High Concurrency**: Efficiently scans wide ranges of ports using multiple threads, allowing for fast and scalable performance for networks of any size.\r\n\r\n- \u23f1\ufe0f **Customizable Settings**: Configure parameters and timeouts according to your network conditions and security requirements.\r\n\r\n- \ud83e\udd16 **AI-Powered Analysis**: Offers smarter vulnerability analysis with actionable insights, helping you take appropriate measures based on findings.\r\n\r\n## \ud83c\udfaf Use Cases:\r\n\r\n- \ud83d\udd13 **Penetration Testing**: Ethical hackers can quickly identify exploitable vulnerabilities in networks, strengthening defenses before malicious actors can attack.\r\n\r\n- \ud83d\udd0d **Network Security Auditing**: IT teams can use NetHawk to audit network security, scanning for open ports, misconfigured services, and hidden vulnerabilities.\r\n\r\n## \ud83d\udd0d Host and Port Scanning Strategy:\r\n\r\nNetHawk employs an efficient combination of Scapy and Nmap to perform host and port scanning, providing comprehensive and redundant coverage, ensuring maximum detection of active hosts and open ports, even in networks with firewall defenses.\r\n\r\n### 1. **Host Detection with Scapy**:\r\n\r\n- **ICMP Ping**: First, NetHawk uses ICMP packets (ping) sent to each host within the target network range to check their availability. If a host responds, it is considered \"active.\"\r\n\r\n- **TCP SYN and ACK Scanning**: For hosts that do not respond to the ping, NetHawk performs a TCP SYN scan, sending SYN packets to the most common ports (80, 443, 22, etc.) to identify responses indicating open ports. If no response is received for the SYN, an ACK scan is attempted to determine if the host is responding to TCP packets.\r\n\r\n- **Fallback to Socket Scan**: If the previous scans fail (possibly due to firewalls blocking ICMP or SYN packets), a direct connection attempt is made using sockets on the same ports, looking for any response that may indicate an open port.\r\n\r\n### 2. **Port Scanning with Scapy and Nmap**:\r\n\r\n- **Scapy**: For hosts identified as active, NetHawk uses Scapy to perform deep port scans. Various scan types are supported, including:\r\n  - **TCP SYN**: Sending SYN packets to discover open ports.\r\n  - **UDP Scan**: Using UDP packets to detect open or filtered ports.\r\n  - **Xmas Scan**: Scanning with malformed TCP packets to test for anomalous responses that may indicate filtered or closed ports.\r\n\r\n- **Nmap**: NetHawk complements Scapy's results with an Nmap scan, providing additional detection capabilities such as identifying service versions and checking less common ports. Nmap is run by default to scan the most commonly used ports or can be configured for custom scans based on specific security requirements.\r\n\r\n- The results from Nmap are consolidated with those from Scapy, eliminating duplicates to offer a clear and detailed final report.\r\n\r\n### 3. **Aggregation and Analysis of Results**:\r\n\r\nNetHawk combines the results from both scans (Scapy and Nmap) to generate a complete list of active hosts and open ports. By merging results from different approaches, duplication is eliminated, providing a unique view of potential network vulnerabilities. With this combination of techniques, NetHawk ensures complete coverage, detecting hosts and open ports that may be hidden from more conventional scanning methods.\r\n\r\n## \ud83c\udf10 Using the NetHawk API\r\n\r\nNetHawk provides a powerful and simplified API for conducting security analyses and network scans. This API abstracts the complexity of using tools like Scapy and Nmap, allowing users to interact with various scanning and vulnerability analysis functions efficiently. Below is a guide to its main methods and functionalities:\r\n\r\n#### 1. \ud83d\ude80 **Initialization (`__init__`)**\r\n\r\nThe main object of the API is the `NetHawkAnalyzer` class. To get started, you need to provide a network range (`network_range`) and other optional parameters like timeout (`timeout`) and an AI API key if necessary.\r\n\r\n- **`network_range`**: The range of IP addresses to scan (e.g., `192.168.1.0/24`).\r\n- **`timeout`**: Timeout in seconds.\r\n- **`groq_api_key`** and **`model_id`**: Optional keys for integration with AI services.\r\n\r\n#### 2. \ud83d\udd0d **Host Scanning (`scan_hosts`)**\r\n\r\nThis method detects active devices on the network, supporting the following scanning methods:\r\n\r\n- **`arp`**: Fast, based on ARP, but limited to local networks.\r\n- **`scapy`**: More advanced scanning that can detect hosts through firewalls.\r\n\r\nThe result is a list of active hosts ready for the next step.\r\n\r\n#### 3. \ud83d\udeaa **Port Scanning (`scan_ports` and `scan_all_ports`)**\r\n\r\nNetHawk scans ports using various techniques to detect open ports:\r\n\r\n- **TCP SYN**: Detects open TCP ports.\r\n- **UDP Scan**: Scans for open or filtered UDP ports.\r\n- **Xmas Scan**: Uses malformed packets to identify filtered ports.\r\n\r\nThe **`scan_all_ports`** method runs all scan types simultaneously to provide a comprehensive view of open ports on each host.\r\n\r\n#### 4. \ud83d\udee0\ufe0f **Service Detection (`scan_services`)**\r\n\r\nNetHawk allows the identification of services running on open ports and retrieves banner information:\r\n\r\n- **`scan_services`**: Scans a list of hosts to detect services and versions, which is crucial for identifying potential vulnerabilities.\r\n\r\n#### 5. \ud83d\udcc1 **SMB Share Scanning (`scan_smb_shares`)**\r\n\r\nYou can also scan hosts for public SMB shares:\r\n\r\n- **`scan_smb_shares`**: Detects shared resources via SMB, helping identify unauthorized access points in the network.\r\n\r\n#### 6. \ud83d\udcdd **Full Network Scan (`run_full_scan`)**\r\n\r\nFor a comprehensive analysis, use the **`run_full_scan`** method, which combines all scanning functionalities into a single operation:\r\n\r\n- This method performs host discovery, port scanning, service detection, and SMB share enumeration.\r\n- Results can be output in both PDF and JSON formats for detailed reporting and analysis.\r\n\r\n### \u26a0\ufe0f **Error Handling**\r\n\r\nThe API raises specific errors for known issues, such as:\r\n\r\n- **`ValueError`**: Raised for unknown scanning methods.\r\n- Proper error handling ensures users are informed of any issues during the scanning process.\r\n\r\n## \ud83d\uddbc\ufe0f Tool Screenshots\r\n\r\nIn this section, we showcase various screenshots of **NetHawk** in action. These visuals illustrate the user interface, scanning processes, and results generated by our AI-powered ethical hacking and network vulnerability assessment tool. Each screenshot highlights the key features and functionalities, providing an insight into how **NetHawk** simplifies the auditing of network security.\r\n\r\nExplore the following images to see how **NetHawk** works and the valuable information it can uncover for cybersecurity professionals, network administrators, and ethical hackers alike!\r\n\r\n\r\n<p align=\"center\">\r\n  <img src=\"doc/screenshots/picture_1.PNG\" />\r\n</p>\r\n\r\n<p align=\"center\">\r\n  <img src=\"doc/screenshots/picture_2.PNG\" />\r\n</p>\r\n\r\n<p align=\"center\">\r\n  <img src=\"doc/screenshots/picture_3.PNG\" />\r\n</p>\r\n\r\n<p align=\"center\">\r\n  <img src=\"doc/screenshots/picture_4.PNG\" />\r\n</p>\r\n\r\n<p align=\"center\">\r\n  <img src=\"doc/screenshots/picture_5.PNG\" />\r\n</p>\r\n\r\n<p align=\"center\">\r\n  <img src=\"doc/screenshots/picture_6.PNG\" />\r\n</p>\r\n\r\n<p align=\"center\">\r\n  <img src=\"doc/screenshots/picture_7.PNG\" />\r\n</p>\r\n\r\n## \ud83d\udce6 Required Dependencies\r\n\r\n| Dependency              | Version    | Description                                                                                   |\r\n|-------------------------|------------|-----------------------------------------------------------------------------------------------|\r\n| **scapy**               | `2.6.0`   | A powerful Python library used for network packet manipulation and analysis.                 |\r\n| **tqdm**                | `4.65.0`   | A fast, extensible progress bar for loops and file processing.                               |\r\n| **rich**                | `13.9.2`  | A library for rich text and beautiful formatting in the terminal.                             |\r\n| **pysmb**               | `1.2.10`  | A Python implementation of the SMB/CIFS protocol for network file sharing.                    |\r\n| **python3-nmap**       | `1.9.1`   | A Python library that allows you to interact with Nmap from your Python scripts.            |\r\n| **langchain**           | `0.2.16`  | A framework for building applications with language models and AI capabilities.               |\r\n| **langchain-groq**      | `0.1.10`  | An extension for Langchain that enables integration with Groq-based systems.                  |\r\n| **fpdf2**               | `2.8.1`   | A library for generating PDF documents using Python.                                         |\r\n| **python-dotenv**       | `1.0.1`   | A tool to read key-value pairs from a `.env` file and set them as environment variables.     |\r\n\r\n## Acknowledgements \ud83d\ude4f\r\n\r\n\ud83d\ude4f I would like to express my sincere gratitude to [Santiago Hern\u00e1ndez, a leading expert in Cybersecurity and Artificial Intelligence](https://www.udemy.com/user/shramos/). His outstanding course on **Cybersecurity and Ethical Hacking**, available on Udemy, was instrumental in the development of this project. The insights and techniques I gained from his course were invaluable in guiding my approach to cybersecurity practices. Thank you for sharing your knowledge and expertise!\r\n\r\n## \ud83e\udd1d **Contributing**\r\nContributions to NetHawk are highly encouraged! If you're interested in adding new features, resolving bugs, or enhancing the project's functionality, please feel free to submit pull requests.\r\n\r\n## Get in Touch \ud83d\udcec\r\n\r\nNetHawk is developed and maintained by **Sergio S\u00e1nchez S\u00e1nchez** (Dream Software). Special thanks to the open-source community and the contributors who have made this project possible. If you have any questions, feedback, or suggestions, feel free to reach out at  [dreamsoftware92@gmail.com](mailto:dreamsoftware92@gmail.com).\r\n\r\n## Visitors Count\r\n\r\n<img width=\"auto\" src=\"https://profile-counter.glitch.me/nethawk_analyzer/count.svg\" />\r\n \r\n ## Please Share & Star the repository to keep me motivated.\r\n  <a href = \"https://github.com/sergio11/nethawk_analyzer/stargazers\">\r\n     <img src = \"https://img.shields.io/github/stars/sergio11/nethawk_analyzer\" />\r\n  </a>\r\n\r\n\r\n[![GitHub](https://img.shields.io/badge/GitHub-View%20on%20GitHub-blue?style=flat-square)](https://github.com/sergio11/nethawk_analyzer)\r\n[![PyPI](https://img.shields.io/pypi/v/VehicleDetectionTracker.svg?style=flat-square)](https://pypi.org/project/NetHawkAnalyzer/)\r\n\r\n## License \u2696\ufe0f\r\n\r\nThis project is licensed under the MIT License, an open-source software license that allows developers to freely use, copy, modify, and distribute the software. \ud83d\udee0\ufe0f This includes use in both personal and commercial projects, with the only requirement being that the original copyright notice is retained. \ud83d\udcc4\r\n\r\nPlease note the following limitations:\r\n\r\n- The software is provided \"as is\", without any warranties, express or implied. \ud83d\udeab\ud83d\udee1\ufe0f\r\n- If you distribute the software, whether in original or modified form, you must include the original copyright notice and license. \ud83d\udcd1\r\n- The license allows for commercial use, but you cannot claim ownership over the software itself. \ud83c\udff7\ufe0f\r\n\r\nThe goal of this license is to maximize freedom for developers while maintaining recognition for the original creators.\r\n\r\n```\r\nMIT License\r\n\r\nCopyright (c) 2024 Dream software - Sergio S\u00e1nchez \r\n\r\nPermission is hereby granted, free of charge, to any person obtaining a copy\r\nof this software and associated documentation files (the \"Software\"), to deal\r\nin the Software without restriction, including without limitation the rights\r\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\r\ncopies of the Software, and to permit persons to whom the Software is\r\nfurnished to do so, subject to the following conditions:\r\n\r\nThe above copyright notice and this permission notice shall be included in all\r\ncopies or substantial portions of the Software.\r\n\r\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\r\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\r\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\r\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\r\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\r\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\r\nSOFTWARE.\r\n```\r\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "\ud83d\udd0d\ud83d\udcbb NetHawkAnalyzer: An advanced AI-powered tool for ethical hacking, cybersecurity network analysis, and vulnerability assessment. \ud83e\udd85\u2728",
    "version": "0.1.10",
    "project_urls": {
        "Homepage": "https://github.com/sergio11/nethawk_analyzer"
    },
    "split_keywords": [
        "cybersecurity",
        " ethical hacking",
        " network analysis",
        " vulnerability assessment",
        " ai",
        " scapy",
        " nmap",
        " python",
        " information security",
        " security auditing"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "27d00de6a707a28e80676e154049d78e7d94c62a95286822cfd958b1d1d8612f",
                "md5": "3c7309b9c9e412c56b2d1512b61de5cc",
                "sha256": "37619805a48385a66390785e8cef879a04b6018f0f1c645fb133be796f50348f"
            },
            "downloads": -1,
            "filename": "NetHawkAnalyzer-0.1.10-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "3c7309b9c9e412c56b2d1512b61de5cc",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": "<4,>=3.7",
            "size": 21232,
            "upload_time": "2024-10-12T11:33:23",
            "upload_time_iso_8601": "2024-10-12T11:33:23.703564Z",
            "url": "https://files.pythonhosted.org/packages/27/d0/0de6a707a28e80676e154049d78e7d94c62a95286822cfd958b1d1d8612f/NetHawkAnalyzer-0.1.10-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "e52d8ecee78c4599e5fbbdaffc7a270de053d8933c0343fc1f57c8f4848781ce",
                "md5": "b82ce0da8c649769152c0820c6cd9fb7",
                "sha256": "29d03fbe83e15a28a25dd85137ac1ece25337475a3b4957fa598ccb129de33f5"
            },
            "downloads": -1,
            "filename": "NetHawkAnalyzer-0.1.10.tar.gz",
            "has_sig": false,
            "md5_digest": "b82ce0da8c649769152c0820c6cd9fb7",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": "<4,>=3.7",
            "size": 18240,
            "upload_time": "2024-10-12T11:33:25",
            "upload_time_iso_8601": "2024-10-12T11:33:25.365548Z",
            "url": "https://files.pythonhosted.org/packages/e5/2d/8ecee78c4599e5fbbdaffc7a270de053d8933c0343fc1f57c8f4848781ce/NetHawkAnalyzer-0.1.10.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-10-12 11:33:25",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "sergio11",
    "github_project": "nethawk_analyzer",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "lcname": "nethawkanalyzer"
}
        
Elapsed time: 0.38770s