OWASP Nettacker
=========
[![Build Status](https://github.com/OWASP/Nettacker/workflows/CI/badge.svg?branch=master)](https://github.com/OWASP/Nettacker/actions/workflows/CI.yml)
[![Apache License](https://img.shields.io/badge/License-Apache%20v2-green.svg)](https://github.com/OWASP/Nettacker/blob/master/LICENSE)
[![Twitter](https://img.shields.io/badge/Twitter-@iotscan-blue.svg)](https://twitter.com/iotscan)
![GitHub contributors](https://img.shields.io/github/contributors/OWASP/Nettacker)
[![repo size ](https://img.shields.io/github/repo-size/OWASP/Nettacker)](https://github.com/OWASP/Nettacker)
<img src="https://raw.githubusercontent.com/OWASP/Nettacker/master/web/static/img/owasp-nettacker.png" width="200"><img src="https://raw.githubusercontent.com/OWASP/Nettacker/master/web/static/img/owasp.png" width="500">
**DISCLAIMER**
* ***THIS SOFTWARE WAS CREATED FOR AUTOMATED PENETRATION TESTING AND INFORMATION GATHERING. CONTRIBUTORS WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.***
![2018-01-19_0-45-07](https://user-images.githubusercontent.com/7676267/35123376-283d5a3e-fcb7-11e7-9b1c-92b78ed4fecc.gif)
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software **will** utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.
* OWASP Page: https://owasp.org/www-project-nettacker/
* Wiki: https://github.com/OWASP/Nettacker/wiki
* Installation: https://github.com/OWASP/Nettacker/wiki/Installation
* Usage: https://github.com/OWASP/Nettacker/wiki/Usage
* GitHub: https://github.com/OWASP/Nettacker
* Slack: #project-nettacker on https://owasp.slack.com
* Mailing List: https://groups.google.com/forum/#!forum/owasp-nettacker
* Docker Image: https://hub.docker.com/r/owasp/nettacker
* How to use the Dockerfile: https://github.com/OWASP/Nettacker/wiki/Installation#docker
* OpenHub: https://www.openhub.net/p/OWASP-Nettacker
* **Donate**: https://owasp.org/donate/?reponame=www-project-nettacker&title=OWASP+Nettacker
____________
Quick Setup & Run
============
```bash
$ docker-compose up -d && docker exec -it nettacker_nettacker_1 /bin/bash
# python nettacker.py -i owasp.org -s -m port_scan
```
* Results are accessible from your (https://localhost:5000) or https://nettacker-api.z3r0d4y.com:5000/ (pointed to your localhost)
* The local database is `.data/nettacker.db` (sqlite).
* Default results path is `.data/results`
* `docker-compose` will share your nettacker folder, so you will not lose any data after `docker-compose down`
* To see the API key in you can run `docker logs nettacker_nettacker_1`.
* More details and setup without docker https://github.com/OWASP/Nettacker/wiki/Installation
_____________
Thanks to our awesome contributors
============
![Awesome Contributors](https://contrib.rocks/image?repo=OWASP/Nettacker)
_____________
## ***IoT Scanner***
* Python Multi Thread & Multi Process Network Information Gathering Vulnerability Scanner
* Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and many more… )
* Asset Discovery & Network Service Analysis
* Services Brute Force Testing
* Services Vulnerability Testing
* HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …
* HTML, JSON, CSV and Text Outputs
* API & WebUI
* This project is at the moment in research and development phase
* Thanks to Google Summer of Code Initiative and all the students who contributed to this project during their summer breaks:
<img src="https://betanews.com/wp-content/uploads/2016/03/vertical-GSoC-logo.jpg" width="200"></img>
_____________
## Stargazers over time
[![Stargazers over time](https://starchart.cc/OWASP/Nettacker.svg)](https://starchart.cc/OWASP/Nettacker)
Raw data
{
"_id": null,
"home_page": "https://owasp.org/www-project-nettacker",
"name": "nettacker",
"maintainer": "",
"docs_url": null,
"requires_python": ">=3.9,<3.13",
"maintainer_email": "",
"keywords": "automation,bruteforce,cve,hacking-tools,information-gathering,network-analysis,owasp,penetration-testing,pentesting,pentesting-tools,port-scanner,python,security-tools,security,vulnerability-management,vulnerability-scanner",
"author": "OWASP Nettacker Contributors",
"author_email": "",
"download_url": "https://files.pythonhosted.org/packages/1c/19/8b34ee27b7c3d24cab18b214da8e8b3cfde7fc4d07fd67b31656642eaee9/nettacker-0.3.1a17.tar.gz",
"platform": null,
"description": "OWASP Nettacker\n=========\n[![Build Status](https://github.com/OWASP/Nettacker/workflows/CI/badge.svg?branch=master)](https://github.com/OWASP/Nettacker/actions/workflows/CI.yml)\n[![Apache License](https://img.shields.io/badge/License-Apache%20v2-green.svg)](https://github.com/OWASP/Nettacker/blob/master/LICENSE)\n[![Twitter](https://img.shields.io/badge/Twitter-@iotscan-blue.svg)](https://twitter.com/iotscan)\n![GitHub contributors](https://img.shields.io/github/contributors/OWASP/Nettacker)\n[![repo size ](https://img.shields.io/github/repo-size/OWASP/Nettacker)](https://github.com/OWASP/Nettacker)\n\n\n<img src=\"https://raw.githubusercontent.com/OWASP/Nettacker/master/web/static/img/owasp-nettacker.png\" width=\"200\"><img src=\"https://raw.githubusercontent.com/OWASP/Nettacker/master/web/static/img/owasp.png\" width=\"500\">\n\n\n**DISCLAIMER**\n\n* ***THIS SOFTWARE WAS CREATED FOR AUTOMATED PENETRATION TESTING AND INFORMATION GATHERING. CONTRIBUTORS WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.***\n\n![2018-01-19_0-45-07](https://user-images.githubusercontent.com/7676267/35123376-283d5a3e-fcb7-11e7-9b1c-92b78ed4fecc.gif)\n\nOWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software **will** utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.\n\n\n* OWASP Page: https://owasp.org/www-project-nettacker/\n* Wiki: https://github.com/OWASP/Nettacker/wiki\n* Installation: https://github.com/OWASP/Nettacker/wiki/Installation\n* Usage: https://github.com/OWASP/Nettacker/wiki/Usage\n* GitHub: https://github.com/OWASP/Nettacker\n* Slack: #project-nettacker on https://owasp.slack.com\n* Mailing List: https://groups.google.com/forum/#!forum/owasp-nettacker\n* Docker Image: https://hub.docker.com/r/owasp/nettacker\n* How to use the Dockerfile: https://github.com/OWASP/Nettacker/wiki/Installation#docker\n* OpenHub: https://www.openhub.net/p/OWASP-Nettacker\n* **Donate**: https://owasp.org/donate/?reponame=www-project-nettacker&title=OWASP+Nettacker\n\n____________\nQuick Setup & Run\n============\n```bash\n$ docker-compose up -d && docker exec -it nettacker_nettacker_1 /bin/bash\n# python nettacker.py -i owasp.org -s -m port_scan\n```\n* Results are accessible from your (https://localhost:5000) or https://nettacker-api.z3r0d4y.com:5000/ (pointed to your localhost)\n* The local database is `.data/nettacker.db` (sqlite).\n* Default results path is `.data/results`\n* `docker-compose` will share your nettacker folder, so you will not lose any data after `docker-compose down`\n* To see the API key in you can run `docker logs nettacker_nettacker_1`.\n* More details and setup without docker https://github.com/OWASP/Nettacker/wiki/Installation\n_____________\nThanks to our awesome contributors\n============\n![Awesome Contributors](https://contrib.rocks/image?repo=OWASP/Nettacker)\n_____________\n\n## ***IoT Scanner***\n*\tPython Multi Thread & Multi Process Network Information Gathering Vulnerability Scanner\n*\tService and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and many more\u2026 ) \n*\tAsset Discovery & Network Service Analysis\n*\tServices Brute Force Testing\n*\tServices Vulnerability Testing\n*\tHTTP/HTTPS Crawling, Fuzzing, Information Gathering and \u2026 \n*\tHTML, JSON, CSV and Text Outputs\n* API & WebUI\n*\tThis project is at the moment in research and development phase \n* Thanks to Google Summer of Code Initiative and all the students who contributed to this project during their summer breaks: \n\n\n<img src=\"https://betanews.com/wp-content/uploads/2016/03/vertical-GSoC-logo.jpg\" width=\"200\"></img>\n\n_____________\n## Stargazers over time\n\n[![Stargazers over time](https://starchart.cc/OWASP/Nettacker.svg)](https://starchart.cc/OWASP/Nettacker)\n\n\n\n",
"bugtrack_url": null,
"license": "Apache-2.0",
"summary": "Automates information gathering, vulnerability scanning and aids penetration testing engagements in general",
"version": "0.3.1a17",
"project_urls": {
"Documentation": "https://github.com/OWASP/Nettacker/wiki",
"Homepage": "https://owasp.org/www-project-nettacker",
"Repository": "https://github.com/OWASP/Nettacker",
"Sponsor": "https://owasp.org/donate/?reponame=www-project-nettacker&title=OWASP+Nettacker"
},
"split_keywords": [
"automation",
"bruteforce",
"cve",
"hacking-tools",
"information-gathering",
"network-analysis",
"owasp",
"penetration-testing",
"pentesting",
"pentesting-tools",
"port-scanner",
"python",
"security-tools",
"security",
"vulnerability-management",
"vulnerability-scanner"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "dfa54fc878e1bf413c76cd4225188e73ac6e5fdd04354d845ebc8470507045f0",
"md5": "2219e94cc49a5228d60dbcdbd1ece81b",
"sha256": "ef943adbe1004aa27265d5593546e2224546b5f9295b66c27aabea5f13855553"
},
"downloads": -1,
"filename": "nettacker-0.3.1a17-py3-none-any.whl",
"has_sig": false,
"md5_digest": "2219e94cc49a5228d60dbcdbd1ece81b",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.9,<3.13",
"size": 3796516,
"upload_time": "2023-10-29T01:59:37",
"upload_time_iso_8601": "2023-10-29T01:59:37.197570Z",
"url": "https://files.pythonhosted.org/packages/df/a5/4fc878e1bf413c76cd4225188e73ac6e5fdd04354d845ebc8470507045f0/nettacker-0.3.1a17-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "1c198b34ee27b7c3d24cab18b214da8e8b3cfde7fc4d07fd67b31656642eaee9",
"md5": "6235a1c9566c33dcab14207b8d369169",
"sha256": "79b02422195ca65c3753b4a175b260c1f127a441ca168db51429cc4e2ce0f34c"
},
"downloads": -1,
"filename": "nettacker-0.3.1a17.tar.gz",
"has_sig": false,
"md5_digest": "6235a1c9566c33dcab14207b8d369169",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.9,<3.13",
"size": 3504748,
"upload_time": "2023-10-29T01:59:39",
"upload_time_iso_8601": "2023-10-29T01:59:39.553884Z",
"url": "https://files.pythonhosted.org/packages/1c/19/8b34ee27b7c3d24cab18b214da8e8b3cfde7fc4d07fd67b31656642eaee9/nettacker-0.3.1a17.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2023-10-29 01:59:39",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "OWASP",
"github_project": "Nettacker",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"requirements": [
{
"name": "argparse",
"specs": [
[
"==",
"1.4.0"
]
]
},
{
"name": "netaddr",
"specs": [
[
"==",
"0.9.0"
]
]
},
{
"name": "ipaddr",
"specs": [
[
"==",
"2.2.0"
]
]
},
{
"name": "requests",
"specs": [
[
"==",
"2.31.0"
]
]
},
{
"name": "aiohttp",
"specs": [
[
"==",
"3.8.5"
]
]
},
{
"name": "asyncio",
"specs": [
[
"==",
"3.4.3"
]
]
},
{
"name": "paramiko",
"specs": [
[
"==",
"3.3.1"
]
]
},
{
"name": "texttable",
"specs": [
[
"==",
"1.6.7"
]
]
},
{
"name": "PySocks",
"specs": [
[
"==",
"1.7.1"
]
]
},
{
"name": "pyOpenSSL",
"specs": [
[
"==",
"23.2.0"
]
]
},
{
"name": "flask",
"specs": [
[
"==",
"3.0.0"
]
]
},
{
"name": "SQLAlchemy",
"specs": [
[
">=",
"1.4.43"
]
]
},
{
"name": "py3DNS",
"specs": [
[
"==",
"4.0.0"
]
]
},
{
"name": "numpy",
"specs": [
[
"==",
"1.26.0"
]
]
},
{
"name": "terminable_thread",
"specs": [
[
"==",
"0.7.1"
]
]
},
{
"name": "PyYAML",
"specs": [
[
"==",
"6.0.1"
]
]
}
],
"lcname": "nettacker"
}