nettacker


Namenettacker JSON
Version 0.3.1a17 PyPI version JSON
download
home_pagehttps://owasp.org/www-project-nettacker
SummaryAutomates information gathering, vulnerability scanning and aids penetration testing engagements in general
upload_time2023-10-29 01:59:39
maintainer
docs_urlNone
authorOWASP Nettacker Contributors
requires_python>=3.9,<3.13
licenseApache-2.0
keywords automation bruteforce cve hacking-tools information-gathering network-analysis owasp penetration-testing pentesting pentesting-tools port-scanner python security-tools security vulnerability-management vulnerability-scanner
VCS
bugtrack_url
requirements argparse netaddr ipaddr requests aiohttp asyncio paramiko texttable PySocks pyOpenSSL flask SQLAlchemy py3DNS numpy terminable_thread PyYAML
Travis-CI No Travis.
coveralls test coverage No coveralls.
            OWASP Nettacker
=========
[![Build Status](https://github.com/OWASP/Nettacker/workflows/CI/badge.svg?branch=master)](https://github.com/OWASP/Nettacker/actions/workflows/CI.yml)
[![Apache License](https://img.shields.io/badge/License-Apache%20v2-green.svg)](https://github.com/OWASP/Nettacker/blob/master/LICENSE)
[![Twitter](https://img.shields.io/badge/Twitter-@iotscan-blue.svg)](https://twitter.com/iotscan)
![GitHub contributors](https://img.shields.io/github/contributors/OWASP/Nettacker)
[![repo size ](https://img.shields.io/github/repo-size/OWASP/Nettacker)](https://github.com/OWASP/Nettacker)


<img src="https://raw.githubusercontent.com/OWASP/Nettacker/master/web/static/img/owasp-nettacker.png" width="200"><img src="https://raw.githubusercontent.com/OWASP/Nettacker/master/web/static/img/owasp.png" width="500">


**DISCLAIMER**

* ***THIS SOFTWARE WAS CREATED FOR AUTOMATED PENETRATION TESTING AND INFORMATION GATHERING. CONTRIBUTORS WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.***

![2018-01-19_0-45-07](https://user-images.githubusercontent.com/7676267/35123376-283d5a3e-fcb7-11e7-9b1c-92b78ed4fecc.gif)

OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software **will** utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.


* OWASP Page: https://owasp.org/www-project-nettacker/
* Wiki: https://github.com/OWASP/Nettacker/wiki
* Installation: https://github.com/OWASP/Nettacker/wiki/Installation
* Usage: https://github.com/OWASP/Nettacker/wiki/Usage
* GitHub: https://github.com/OWASP/Nettacker
* Slack: #project-nettacker on https://owasp.slack.com
* Mailing List: https://groups.google.com/forum/#!forum/owasp-nettacker
* Docker Image: https://hub.docker.com/r/owasp/nettacker
* How to use the Dockerfile: https://github.com/OWASP/Nettacker/wiki/Installation#docker
* OpenHub: https://www.openhub.net/p/OWASP-Nettacker
* **Donate**: https://owasp.org/donate/?reponame=www-project-nettacker&title=OWASP+Nettacker

____________
Quick Setup & Run
============
```bash
$ docker-compose up -d && docker exec -it nettacker_nettacker_1 /bin/bash
# python nettacker.py -i owasp.org -s -m port_scan
```
* Results are accessible from your (https://localhost:5000) or https://nettacker-api.z3r0d4y.com:5000/ (pointed to your localhost)
* The local database is `.data/nettacker.db` (sqlite).
* Default results path is `.data/results`
* `docker-compose` will share your nettacker folder, so you will not lose any data after `docker-compose down`
* To see the API key in you can run `docker logs nettacker_nettacker_1`.
* More details and setup without docker https://github.com/OWASP/Nettacker/wiki/Installation
_____________
Thanks to our awesome contributors
============
![Awesome Contributors](https://contrib.rocks/image?repo=OWASP/Nettacker)
_____________

## ***IoT Scanner***
*	Python Multi Thread & Multi Process Network Information Gathering Vulnerability Scanner
*	Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and many more… ) 
*	Asset Discovery & Network Service Analysis
*	Services Brute Force Testing
*	Services Vulnerability Testing
*	HTTP/HTTPS Crawling, Fuzzing, Information Gathering and … 
*	HTML, JSON, CSV and Text Outputs
* API & WebUI
*	This project is at the moment in research and development phase 
* Thanks to Google Summer of Code Initiative and all the students who contributed to this project during their summer breaks: 


<img src="https://betanews.com/wp-content/uploads/2016/03/vertical-GSoC-logo.jpg" width="200"></img>

_____________
## Stargazers over time

[![Stargazers over time](https://starchart.cc/OWASP/Nettacker.svg)](https://starchart.cc/OWASP/Nettacker)




            

Raw data

            {
    "_id": null,
    "home_page": "https://owasp.org/www-project-nettacker",
    "name": "nettacker",
    "maintainer": "",
    "docs_url": null,
    "requires_python": ">=3.9,<3.13",
    "maintainer_email": "",
    "keywords": "automation,bruteforce,cve,hacking-tools,information-gathering,network-analysis,owasp,penetration-testing,pentesting,pentesting-tools,port-scanner,python,security-tools,security,vulnerability-management,vulnerability-scanner",
    "author": "OWASP Nettacker Contributors",
    "author_email": "",
    "download_url": "https://files.pythonhosted.org/packages/1c/19/8b34ee27b7c3d24cab18b214da8e8b3cfde7fc4d07fd67b31656642eaee9/nettacker-0.3.1a17.tar.gz",
    "platform": null,
    "description": "OWASP Nettacker\n=========\n[![Build Status](https://github.com/OWASP/Nettacker/workflows/CI/badge.svg?branch=master)](https://github.com/OWASP/Nettacker/actions/workflows/CI.yml)\n[![Apache License](https://img.shields.io/badge/License-Apache%20v2-green.svg)](https://github.com/OWASP/Nettacker/blob/master/LICENSE)\n[![Twitter](https://img.shields.io/badge/Twitter-@iotscan-blue.svg)](https://twitter.com/iotscan)\n![GitHub contributors](https://img.shields.io/github/contributors/OWASP/Nettacker)\n[![repo size ](https://img.shields.io/github/repo-size/OWASP/Nettacker)](https://github.com/OWASP/Nettacker)\n\n\n<img src=\"https://raw.githubusercontent.com/OWASP/Nettacker/master/web/static/img/owasp-nettacker.png\" width=\"200\"><img src=\"https://raw.githubusercontent.com/OWASP/Nettacker/master/web/static/img/owasp.png\" width=\"500\">\n\n\n**DISCLAIMER**\n\n* ***THIS SOFTWARE WAS CREATED FOR AUTOMATED PENETRATION TESTING AND INFORMATION GATHERING. CONTRIBUTORS WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.***\n\n![2018-01-19_0-45-07](https://user-images.githubusercontent.com/7676267/35123376-283d5a3e-fcb7-11e7-9b1c-92b78ed4fecc.gif)\n\nOWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software **will** utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.\n\n\n* OWASP Page: https://owasp.org/www-project-nettacker/\n* Wiki: https://github.com/OWASP/Nettacker/wiki\n* Installation: https://github.com/OWASP/Nettacker/wiki/Installation\n* Usage: https://github.com/OWASP/Nettacker/wiki/Usage\n* GitHub: https://github.com/OWASP/Nettacker\n* Slack: #project-nettacker on https://owasp.slack.com\n* Mailing List: https://groups.google.com/forum/#!forum/owasp-nettacker\n* Docker Image: https://hub.docker.com/r/owasp/nettacker\n* How to use the Dockerfile: https://github.com/OWASP/Nettacker/wiki/Installation#docker\n* OpenHub: https://www.openhub.net/p/OWASP-Nettacker\n* **Donate**: https://owasp.org/donate/?reponame=www-project-nettacker&title=OWASP+Nettacker\n\n____________\nQuick Setup & Run\n============\n```bash\n$ docker-compose up -d && docker exec -it nettacker_nettacker_1 /bin/bash\n# python nettacker.py -i owasp.org -s -m port_scan\n```\n* Results are accessible from your (https://localhost:5000) or https://nettacker-api.z3r0d4y.com:5000/ (pointed to your localhost)\n* The local database is `.data/nettacker.db` (sqlite).\n* Default results path is `.data/results`\n* `docker-compose` will share your nettacker folder, so you will not lose any data after `docker-compose down`\n* To see the API key in you can run `docker logs nettacker_nettacker_1`.\n* More details and setup without docker https://github.com/OWASP/Nettacker/wiki/Installation\n_____________\nThanks to our awesome contributors\n============\n![Awesome Contributors](https://contrib.rocks/image?repo=OWASP/Nettacker)\n_____________\n\n## ***IoT Scanner***\n*\tPython Multi Thread & Multi Process Network Information Gathering Vulnerability Scanner\n*\tService and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and many more\u2026 ) \n*\tAsset Discovery & Network Service Analysis\n*\tServices Brute Force Testing\n*\tServices Vulnerability Testing\n*\tHTTP/HTTPS Crawling, Fuzzing, Information Gathering and \u2026 \n*\tHTML, JSON, CSV and Text Outputs\n* API & WebUI\n*\tThis project is at the moment in research and development phase \n* Thanks to Google Summer of Code Initiative and all the students who contributed to this project during their summer breaks: \n\n\n<img src=\"https://betanews.com/wp-content/uploads/2016/03/vertical-GSoC-logo.jpg\" width=\"200\"></img>\n\n_____________\n## Stargazers over time\n\n[![Stargazers over time](https://starchart.cc/OWASP/Nettacker.svg)](https://starchart.cc/OWASP/Nettacker)\n\n\n\n",
    "bugtrack_url": null,
    "license": "Apache-2.0",
    "summary": "Automates information gathering, vulnerability scanning and aids penetration testing engagements in general",
    "version": "0.3.1a17",
    "project_urls": {
        "Documentation": "https://github.com/OWASP/Nettacker/wiki",
        "Homepage": "https://owasp.org/www-project-nettacker",
        "Repository": "https://github.com/OWASP/Nettacker",
        "Sponsor": "https://owasp.org/donate/?reponame=www-project-nettacker&title=OWASP+Nettacker"
    },
    "split_keywords": [
        "automation",
        "bruteforce",
        "cve",
        "hacking-tools",
        "information-gathering",
        "network-analysis",
        "owasp",
        "penetration-testing",
        "pentesting",
        "pentesting-tools",
        "port-scanner",
        "python",
        "security-tools",
        "security",
        "vulnerability-management",
        "vulnerability-scanner"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "dfa54fc878e1bf413c76cd4225188e73ac6e5fdd04354d845ebc8470507045f0",
                "md5": "2219e94cc49a5228d60dbcdbd1ece81b",
                "sha256": "ef943adbe1004aa27265d5593546e2224546b5f9295b66c27aabea5f13855553"
            },
            "downloads": -1,
            "filename": "nettacker-0.3.1a17-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "2219e94cc49a5228d60dbcdbd1ece81b",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.9,<3.13",
            "size": 3796516,
            "upload_time": "2023-10-29T01:59:37",
            "upload_time_iso_8601": "2023-10-29T01:59:37.197570Z",
            "url": "https://files.pythonhosted.org/packages/df/a5/4fc878e1bf413c76cd4225188e73ac6e5fdd04354d845ebc8470507045f0/nettacker-0.3.1a17-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "1c198b34ee27b7c3d24cab18b214da8e8b3cfde7fc4d07fd67b31656642eaee9",
                "md5": "6235a1c9566c33dcab14207b8d369169",
                "sha256": "79b02422195ca65c3753b4a175b260c1f127a441ca168db51429cc4e2ce0f34c"
            },
            "downloads": -1,
            "filename": "nettacker-0.3.1a17.tar.gz",
            "has_sig": false,
            "md5_digest": "6235a1c9566c33dcab14207b8d369169",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.9,<3.13",
            "size": 3504748,
            "upload_time": "2023-10-29T01:59:39",
            "upload_time_iso_8601": "2023-10-29T01:59:39.553884Z",
            "url": "https://files.pythonhosted.org/packages/1c/19/8b34ee27b7c3d24cab18b214da8e8b3cfde7fc4d07fd67b31656642eaee9/nettacker-0.3.1a17.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-10-29 01:59:39",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "OWASP",
    "github_project": "Nettacker",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "requirements": [
        {
            "name": "argparse",
            "specs": [
                [
                    "==",
                    "1.4.0"
                ]
            ]
        },
        {
            "name": "netaddr",
            "specs": [
                [
                    "==",
                    "0.9.0"
                ]
            ]
        },
        {
            "name": "ipaddr",
            "specs": [
                [
                    "==",
                    "2.2.0"
                ]
            ]
        },
        {
            "name": "requests",
            "specs": [
                [
                    "==",
                    "2.31.0"
                ]
            ]
        },
        {
            "name": "aiohttp",
            "specs": [
                [
                    "==",
                    "3.8.5"
                ]
            ]
        },
        {
            "name": "asyncio",
            "specs": [
                [
                    "==",
                    "3.4.3"
                ]
            ]
        },
        {
            "name": "paramiko",
            "specs": [
                [
                    "==",
                    "3.3.1"
                ]
            ]
        },
        {
            "name": "texttable",
            "specs": [
                [
                    "==",
                    "1.6.7"
                ]
            ]
        },
        {
            "name": "PySocks",
            "specs": [
                [
                    "==",
                    "1.7.1"
                ]
            ]
        },
        {
            "name": "pyOpenSSL",
            "specs": [
                [
                    "==",
                    "23.2.0"
                ]
            ]
        },
        {
            "name": "flask",
            "specs": [
                [
                    "==",
                    "3.0.0"
                ]
            ]
        },
        {
            "name": "SQLAlchemy",
            "specs": [
                [
                    ">=",
                    "1.4.43"
                ]
            ]
        },
        {
            "name": "py3DNS",
            "specs": [
                [
                    "==",
                    "4.0.0"
                ]
            ]
        },
        {
            "name": "numpy",
            "specs": [
                [
                    "==",
                    "1.26.0"
                ]
            ]
        },
        {
            "name": "terminable_thread",
            "specs": [
                [
                    "==",
                    "0.7.1"
                ]
            ]
        },
        {
            "name": "PyYAML",
            "specs": [
                [
                    "==",
                    "6.0.1"
                ]
            ]
        }
    ],
    "lcname": "nettacker"
}
        
Elapsed time: 0.12999s