Pytheas22


NamePytheas22 JSON
Version 0.0.9 PyPI version JSON
download
home_page
SummaryPytheas22 is a Port Scanner which scans IP-Cameras, internal networks, individual hosts and arp spoofing. If the port 22 is open it will try to login to that host via bruteforce
upload_time2023-12-18 12:28:06
maintainer
docs_urlNone
authorFawaz Bashiru
requires_python
licenseMIT
keywords portscanner
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            Pytheas22
=========

![image](https://github.com/Kill0geR/KeyloggerScreenshot/assets/106278241/e0eccdd6-8a59-4d3a-aef6-0419719de5ac)


Created by: Fawaz Bashiru

Pytheas22 is an innovative Port Scanner. It scans IP-Cameras of countries, your home network and individual IP-Addresses or websites. Analysis of the IP-Cameras and the scanned home network will be saved in a database. Every open port will have a documentation.

If the port 22 of an IP-Address or a website is open pytheas22 will try to log in to the host via bruteforce.

Check out my github: https://github.com/Kill0geR/Pytheas22

Making a range of ports
=========
```python
from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()
```
This makes a list of every well_known ports
Output of that list will look like this:

```
[20, 21, 22, 23, 25, 53, 80, 110, 119, 123, 135, 139, 143, 161, 194, 389, 443, 445, 515, 520, 636, 3389, 5060, 5061, 5357, 8001, 8002, 8080, 9080, 9999, 62078]
```

If you want to make your own list simply do this:
```python
from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(port_range="20-80")
scanner_lst = scanner.make_lst()
```
This will make a list from 20 to 80
Output of that list will look like this:

```
[20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80]

```

Scanning with Pytheas22
---------------------
After you made your list you have to choose what you want to scan

* To scan your home network:

```python
from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()

start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_internal_network()
```

* To scan ip cameras:
```python
from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()

start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_ip_cameras()
```

* To scan one host:
```python
from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()

start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_one_addr("127.0.0.1") #websites also work like start_scan.scan_one_addr("https://google.com")
```

* All included:
````python
from Pytheas22 import Port_Scanner

ask_port_scanner = Port_Scanner.PortScanner()
ask_port_scanner.question()


````
This will have every scanning opportunity. Every step will be questioned like in the picture. Just like the GitHub version


Bruteforcing hosts with open ssh ports
---------------------------

To Bruteforce hosts with open ssh ports simply set the parameter 'ssh_bruteforce' from PythonPortScanner to True:
```python
from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()

start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst, ssh_bruteforce=True)
start_scan.internal_network()
```
The wordlist for that bruteforce is on my GitHub: https://github.com/Kill0geR/Pytheas22


Arp Spoofing targets from your network
----------------------------------------
```python
from Pytheas22 import Python_Port_Scanner

arp_spoof = Python_Port_Scanner.ArpSpoofing()
arp_spoof.spoof_network()
```
Follow the instructions to know what to do (WORKS ONLY ON LINUX!!!!)


Additional
==========
* Works on Linux and Windows (recommended in Linux). Arp Poisoning works only on linux

* Pytheas22 is very easy to use.

* Port scanning on IPv6 is also possible 

* Bruteforce list is trained on ip-cameras

* DO NOT USE THIS TO ATTACK SOMEONE FOREIGN. I BUILD IT FOR EDUCATIONAL PURPOSES.


Change Log
==========

0.0.1 (01/06/2023)
-----------------
- First Release

0.0.2 (05/06/2023)
-----------------
- New Internal database
- Files on GitHub now work on windows
- "question" function now also works on windows

0.0.2.1 (10/06/2023)
--------------------
- (small fixes)

0.0.3 (28/07/2023)
--------------------
- prints hostnames of internal network
- new printing system
- more efficient port information

0.0.4 (01/08/2023)
--------------------
- 15x faster port scanning

0.0.5 (10/09/2023)
--------------------
- Better Code
- New Arp Poisoning Feature (only on Linux)
- Better Port scanning on Windows
- Shows Seconds over run seconds when scanning lots of ip's
- Multithreading Error fixed

0.0.6 (17/09/2023)
------------------
- New Printing Modell
- New Python_Port_Scanner.py Script

0.0.7 (12/12/2023)
-------------------
- IPv6 port scanning
- new terminal look
- Getting the exact location of the target's IP

0.0.7.1 (15/12/2023)
-------------------
- Download fix

0.0.7.2 (15/12/2023)
--------------------
- Error fix

0.0.8 (16/12/2023)
--------------------
- New Portscanning Model in Linux
- New Hostname features in Linux
- Port scanning error fixed in Linux

0.0.9 (18/12/2023)
--------------------
- Network scan fix

            

Raw data

            {
    "_id": null,
    "home_page": "",
    "name": "Pytheas22",
    "maintainer": "",
    "docs_url": null,
    "requires_python": "",
    "maintainer_email": "",
    "keywords": "portscanner",
    "author": "Fawaz Bashiru",
    "author_email": "fawazbashiru@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/25/9a/fe76707a366f08882c6bcb609022b09fd1164faeb6615b32dd023f75f80b/Pytheas22-0.0.9.tar.gz",
    "platform": null,
    "description": "Pytheas22\n=========\n\n![image](https://github.com/Kill0geR/KeyloggerScreenshot/assets/106278241/e0eccdd6-8a59-4d3a-aef6-0419719de5ac)\n\n\nCreated by: Fawaz Bashiru\n\nPytheas22 is an innovative Port Scanner. It scans IP-Cameras of countries, your home network and individual IP-Addresses or websites. Analysis of the IP-Cameras and the scanned home network will be saved in a database. Every open port will have a documentation.\n\nIf the port 22 of an IP-Address or a website is open pytheas22 will try to log in to the host via bruteforce.\n\nCheck out my github: https://github.com/Kill0geR/Pytheas22\n\nMaking a range of ports\n=========\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)\nscanner_lst = scanner.make_lst()\n```\nThis makes a list of every well_known ports\nOutput of that list will look like this:\n\n```\n[20, 21, 22, 23, 25, 53, 80, 110, 119, 123, 135, 139, 143, 161, 194, 389, 443, 445, 515, 520, 636, 3389, 5060, 5061, 5357, 8001, 8002, 8080, 9080, 9999, 62078]\n```\n\nIf you want to make your own list simply do this:\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(port_range=\"20-80\")\nscanner_lst = scanner.make_lst()\n```\nThis will make a list from 20 to 80\nOutput of that list will look like this:\n\n```\n[20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80]\n\n```\n\nScanning with Pytheas22\n---------------------\nAfter you made your list you have to choose what you want to scan\n\n* To scan your home network:\n\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)\nscanner_lst = scanner.make_lst()\n\nstart_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)\nstart_scan.scan_internal_network()\n```\n\n* To scan ip cameras:\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)\nscanner_lst = scanner.make_lst()\n\nstart_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)\nstart_scan.scan_ip_cameras()\n```\n\n* To scan one host:\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)\nscanner_lst = scanner.make_lst()\n\nstart_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)\nstart_scan.scan_one_addr(\"127.0.0.1\") #websites also work like start_scan.scan_one_addr(\"https://google.com\")\n```\n\n* All included:\n````python\nfrom Pytheas22 import Port_Scanner\n\nask_port_scanner = Port_Scanner.PortScanner()\nask_port_scanner.question()\n\n\n````\nThis will have every scanning opportunity. Every step will be questioned like in the picture. Just like the GitHub version\n\n\nBruteforcing hosts with open ssh ports\n---------------------------\n\nTo Bruteforce hosts with open ssh ports simply set the parameter 'ssh_bruteforce' from PythonPortScanner to True:\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)\nscanner_lst = scanner.make_lst()\n\nstart_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst, ssh_bruteforce=True)\nstart_scan.internal_network()\n```\nThe wordlist for that bruteforce is on my GitHub: https://github.com/Kill0geR/Pytheas22\n\n\nArp Spoofing targets from your network\n----------------------------------------\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\narp_spoof = Python_Port_Scanner.ArpSpoofing()\narp_spoof.spoof_network()\n```\nFollow the instructions to know what to do (WORKS ONLY ON LINUX!!!!)\n\n\nAdditional\n==========\n* Works on Linux and Windows (recommended in Linux). Arp Poisoning works only on linux\n\n* Pytheas22 is very easy to use.\n\n* Port scanning on IPv6 is also possible \n\n* Bruteforce list is trained on ip-cameras\n\n* DO NOT USE THIS TO ATTACK SOMEONE FOREIGN. I BUILD IT FOR EDUCATIONAL PURPOSES.\n\n\nChange Log\n==========\n\n0.0.1 (01/06/2023)\n-----------------\n- First Release\n\n0.0.2 (05/06/2023)\n-----------------\n- New Internal database\n- Files on GitHub now work on windows\n- \"question\" function now also works on windows\n\n0.0.2.1 (10/06/2023)\n--------------------\n- (small fixes)\n\n0.0.3 (28/07/2023)\n--------------------\n- prints hostnames of internal network\n- new printing system\n- more efficient port information\n\n0.0.4 (01/08/2023)\n--------------------\n- 15x faster port scanning\n\n0.0.5 (10/09/2023)\n--------------------\n- Better Code\n- New Arp Poisoning Feature (only on Linux)\n- Better Port scanning on Windows\n- Shows Seconds over run seconds when scanning lots of ip's\n- Multithreading Error fixed\n\n0.0.6 (17/09/2023)\n------------------\n- New Printing Modell\n- New Python_Port_Scanner.py Script\n\n0.0.7 (12/12/2023)\n-------------------\n- IPv6 port scanning\n- new terminal look\n- Getting the exact location of the target's IP\n\n0.0.7.1 (15/12/2023)\n-------------------\n- Download fix\n\n0.0.7.2 (15/12/2023)\n--------------------\n- Error fix\n\n0.0.8 (16/12/2023)\n--------------------\n- New Portscanning Model in Linux\n- New Hostname features in Linux\n- Port scanning error fixed in Linux\n\n0.0.9 (18/12/2023)\n--------------------\n- Network scan fix\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Pytheas22 is a Port Scanner which scans IP-Cameras, internal networks, individual hosts and arp spoofing. If the port 22 is open it will try to login to that host via bruteforce",
    "version": "0.0.9",
    "project_urls": null,
    "split_keywords": [
        "portscanner"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "259afe76707a366f08882c6bcb609022b09fd1164faeb6615b32dd023f75f80b",
                "md5": "aaecc4412feacd375849d9c8607e76ad",
                "sha256": "071046dc80c6cdba94be8b3485ff901f24313c9a31f0ceafcd10387e47a3bbb2"
            },
            "downloads": -1,
            "filename": "Pytheas22-0.0.9.tar.gz",
            "has_sig": false,
            "md5_digest": "aaecc4412feacd375849d9c8607e76ad",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 18641,
            "upload_time": "2023-12-18T12:28:06",
            "upload_time_iso_8601": "2023-12-18T12:28:06.100777Z",
            "url": "https://files.pythonhosted.org/packages/25/9a/fe76707a366f08882c6bcb609022b09fd1164faeb6615b32dd023f75f80b/Pytheas22-0.0.9.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-12-18 12:28:06",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "lcname": "pytheas22"
}
        
Elapsed time: 0.16055s