Name | Pytheas22 JSON |
Version |
0.0.9
JSON |
| download |
home_page | |
Summary | Pytheas22 is a Port Scanner which scans IP-Cameras, internal networks, individual hosts and arp spoofing. If the port 22 is open it will try to login to that host via bruteforce |
upload_time | 2023-12-18 12:28:06 |
maintainer | |
docs_url | None |
author | Fawaz Bashiru |
requires_python | |
license | MIT |
keywords |
portscanner
|
VCS |
|
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
Pytheas22
=========
![image](https://github.com/Kill0geR/KeyloggerScreenshot/assets/106278241/e0eccdd6-8a59-4d3a-aef6-0419719de5ac)
Created by: Fawaz Bashiru
Pytheas22 is an innovative Port Scanner. It scans IP-Cameras of countries, your home network and individual IP-Addresses or websites. Analysis of the IP-Cameras and the scanned home network will be saved in a database. Every open port will have a documentation.
If the port 22 of an IP-Address or a website is open pytheas22 will try to log in to the host via bruteforce.
Check out my github: https://github.com/Kill0geR/Pytheas22
Making a range of ports
=========
```python
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()
```
This makes a list of every well_known ports
Output of that list will look like this:
```
[20, 21, 22, 23, 25, 53, 80, 110, 119, 123, 135, 139, 143, 161, 194, 389, 443, 445, 515, 520, 636, 3389, 5060, 5061, 5357, 8001, 8002, 8080, 9080, 9999, 62078]
```
If you want to make your own list simply do this:
```python
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(port_range="20-80")
scanner_lst = scanner.make_lst()
```
This will make a list from 20 to 80
Output of that list will look like this:
```
[20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80]
```
Scanning with Pytheas22
---------------------
After you made your list you have to choose what you want to scan
* To scan your home network:
```python
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()
start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_internal_network()
```
* To scan ip cameras:
```python
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()
start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_ip_cameras()
```
* To scan one host:
```python
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()
start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_one_addr("127.0.0.1") #websites also work like start_scan.scan_one_addr("https://google.com")
```
* All included:
````python
from Pytheas22 import Port_Scanner
ask_port_scanner = Port_Scanner.PortScanner()
ask_port_scanner.question()
````
This will have every scanning opportunity. Every step will be questioned like in the picture. Just like the GitHub version
Bruteforcing hosts with open ssh ports
---------------------------
To Bruteforce hosts with open ssh ports simply set the parameter 'ssh_bruteforce' from PythonPortScanner to True:
```python
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()
start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst, ssh_bruteforce=True)
start_scan.internal_network()
```
The wordlist for that bruteforce is on my GitHub: https://github.com/Kill0geR/Pytheas22
Arp Spoofing targets from your network
----------------------------------------
```python
from Pytheas22 import Python_Port_Scanner
arp_spoof = Python_Port_Scanner.ArpSpoofing()
arp_spoof.spoof_network()
```
Follow the instructions to know what to do (WORKS ONLY ON LINUX!!!!)
Additional
==========
* Works on Linux and Windows (recommended in Linux). Arp Poisoning works only on linux
* Pytheas22 is very easy to use.
* Port scanning on IPv6 is also possible
* Bruteforce list is trained on ip-cameras
* DO NOT USE THIS TO ATTACK SOMEONE FOREIGN. I BUILD IT FOR EDUCATIONAL PURPOSES.
Change Log
==========
0.0.1 (01/06/2023)
-----------------
- First Release
0.0.2 (05/06/2023)
-----------------
- New Internal database
- Files on GitHub now work on windows
- "question" function now also works on windows
0.0.2.1 (10/06/2023)
--------------------
- (small fixes)
0.0.3 (28/07/2023)
--------------------
- prints hostnames of internal network
- new printing system
- more efficient port information
0.0.4 (01/08/2023)
--------------------
- 15x faster port scanning
0.0.5 (10/09/2023)
--------------------
- Better Code
- New Arp Poisoning Feature (only on Linux)
- Better Port scanning on Windows
- Shows Seconds over run seconds when scanning lots of ip's
- Multithreading Error fixed
0.0.6 (17/09/2023)
------------------
- New Printing Modell
- New Python_Port_Scanner.py Script
0.0.7 (12/12/2023)
-------------------
- IPv6 port scanning
- new terminal look
- Getting the exact location of the target's IP
0.0.7.1 (15/12/2023)
-------------------
- Download fix
0.0.7.2 (15/12/2023)
--------------------
- Error fix
0.0.8 (16/12/2023)
--------------------
- New Portscanning Model in Linux
- New Hostname features in Linux
- Port scanning error fixed in Linux
0.0.9 (18/12/2023)
--------------------
- Network scan fix
Raw data
{
"_id": null,
"home_page": "",
"name": "Pytheas22",
"maintainer": "",
"docs_url": null,
"requires_python": "",
"maintainer_email": "",
"keywords": "portscanner",
"author": "Fawaz Bashiru",
"author_email": "fawazbashiru@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/25/9a/fe76707a366f08882c6bcb609022b09fd1164faeb6615b32dd023f75f80b/Pytheas22-0.0.9.tar.gz",
"platform": null,
"description": "Pytheas22\n=========\n\n![image](https://github.com/Kill0geR/KeyloggerScreenshot/assets/106278241/e0eccdd6-8a59-4d3a-aef6-0419719de5ac)\n\n\nCreated by: Fawaz Bashiru\n\nPytheas22 is an innovative Port Scanner. It scans IP-Cameras of countries, your home network and individual IP-Addresses or websites. Analysis of the IP-Cameras and the scanned home network will be saved in a database. Every open port will have a documentation.\n\nIf the port 22 of an IP-Address or a website is open pytheas22 will try to log in to the host via bruteforce.\n\nCheck out my github: https://github.com/Kill0geR/Pytheas22\n\nMaking a range of ports\n=========\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)\nscanner_lst = scanner.make_lst()\n```\nThis makes a list of every well_known ports\nOutput of that list will look like this:\n\n```\n[20, 21, 22, 23, 25, 53, 80, 110, 119, 123, 135, 139, 143, 161, 194, 389, 443, 445, 515, 520, 636, 3389, 5060, 5061, 5357, 8001, 8002, 8080, 9080, 9999, 62078]\n```\n\nIf you want to make your own list simply do this:\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(port_range=\"20-80\")\nscanner_lst = scanner.make_lst()\n```\nThis will make a list from 20 to 80\nOutput of that list will look like this:\n\n```\n[20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80]\n\n```\n\nScanning with Pytheas22\n---------------------\nAfter you made your list you have to choose what you want to scan\n\n* To scan your home network:\n\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)\nscanner_lst = scanner.make_lst()\n\nstart_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)\nstart_scan.scan_internal_network()\n```\n\n* To scan ip cameras:\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)\nscanner_lst = scanner.make_lst()\n\nstart_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)\nstart_scan.scan_ip_cameras()\n```\n\n* To scan one host:\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)\nscanner_lst = scanner.make_lst()\n\nstart_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)\nstart_scan.scan_one_addr(\"127.0.0.1\") #websites also work like start_scan.scan_one_addr(\"https://google.com\")\n```\n\n* All included:\n````python\nfrom Pytheas22 import Port_Scanner\n\nask_port_scanner = Port_Scanner.PortScanner()\nask_port_scanner.question()\n\n\n````\nThis will have every scanning opportunity. Every step will be questioned like in the picture. Just like the GitHub version\n\n\nBruteforcing hosts with open ssh ports\n---------------------------\n\nTo Bruteforce hosts with open ssh ports simply set the parameter 'ssh_bruteforce' from PythonPortScanner to True:\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\nscanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)\nscanner_lst = scanner.make_lst()\n\nstart_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst, ssh_bruteforce=True)\nstart_scan.internal_network()\n```\nThe wordlist for that bruteforce is on my GitHub: https://github.com/Kill0geR/Pytheas22\n\n\nArp Spoofing targets from your network\n----------------------------------------\n```python\nfrom Pytheas22 import Python_Port_Scanner\n\narp_spoof = Python_Port_Scanner.ArpSpoofing()\narp_spoof.spoof_network()\n```\nFollow the instructions to know what to do (WORKS ONLY ON LINUX!!!!)\n\n\nAdditional\n==========\n* Works on Linux and Windows (recommended in Linux). Arp Poisoning works only on linux\n\n* Pytheas22 is very easy to use.\n\n* Port scanning on IPv6 is also possible \n\n* Bruteforce list is trained on ip-cameras\n\n* DO NOT USE THIS TO ATTACK SOMEONE FOREIGN. I BUILD IT FOR EDUCATIONAL PURPOSES.\n\n\nChange Log\n==========\n\n0.0.1 (01/06/2023)\n-----------------\n- First Release\n\n0.0.2 (05/06/2023)\n-----------------\n- New Internal database\n- Files on GitHub now work on windows\n- \"question\" function now also works on windows\n\n0.0.2.1 (10/06/2023)\n--------------------\n- (small fixes)\n\n0.0.3 (28/07/2023)\n--------------------\n- prints hostnames of internal network\n- new printing system\n- more efficient port information\n\n0.0.4 (01/08/2023)\n--------------------\n- 15x faster port scanning\n\n0.0.5 (10/09/2023)\n--------------------\n- Better Code\n- New Arp Poisoning Feature (only on Linux)\n- Better Port scanning on Windows\n- Shows Seconds over run seconds when scanning lots of ip's\n- Multithreading Error fixed\n\n0.0.6 (17/09/2023)\n------------------\n- New Printing Modell\n- New Python_Port_Scanner.py Script\n\n0.0.7 (12/12/2023)\n-------------------\n- IPv6 port scanning\n- new terminal look\n- Getting the exact location of the target's IP\n\n0.0.7.1 (15/12/2023)\n-------------------\n- Download fix\n\n0.0.7.2 (15/12/2023)\n--------------------\n- Error fix\n\n0.0.8 (16/12/2023)\n--------------------\n- New Portscanning Model in Linux\n- New Hostname features in Linux\n- Port scanning error fixed in Linux\n\n0.0.9 (18/12/2023)\n--------------------\n- Network scan fix\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "Pytheas22 is a Port Scanner which scans IP-Cameras, internal networks, individual hosts and arp spoofing. If the port 22 is open it will try to login to that host via bruteforce",
"version": "0.0.9",
"project_urls": null,
"split_keywords": [
"portscanner"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "259afe76707a366f08882c6bcb609022b09fd1164faeb6615b32dd023f75f80b",
"md5": "aaecc4412feacd375849d9c8607e76ad",
"sha256": "071046dc80c6cdba94be8b3485ff901f24313c9a31f0ceafcd10387e47a3bbb2"
},
"downloads": -1,
"filename": "Pytheas22-0.0.9.tar.gz",
"has_sig": false,
"md5_digest": "aaecc4412feacd375849d9c8607e76ad",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 18641,
"upload_time": "2023-12-18T12:28:06",
"upload_time_iso_8601": "2023-12-18T12:28:06.100777Z",
"url": "https://files.pythonhosted.org/packages/25/9a/fe76707a366f08882c6bcb609022b09fd1164faeb6615b32dd023f75f80b/Pytheas22-0.0.9.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2023-12-18 12:28:06",
"github": false,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"lcname": "pytheas22"
}