Skip to content

NetEye is a python based scanning and enum tool that can scan networks, endpoints, and different hosts for open ports and potential vulnerabilities with some other feathers as well.

Notifications You must be signed in to change notification settings

iabdullah215/NetEye

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

                   /$$   /$$             /$$|          /$$$$$$$$|
                  | $$$ | $$            | $$          | $$_____/
                  | $$$$| $$  /$$$$$$  /$$$$$$        | $$       /$$   /$$  /$$$$$$
                  | $$ $$ $$ /$$__  $$|_  $$_/        | $$$$$   | $$  | $$ /$$__  $$
                  | $$  $$$$| $$$$$$$$  | $$          | $$__/   | $$  | $$| $$$$$$$$
                  | $$\  $$$| $$_____/  | $$ /$$      | $$      | $$  | $$| $$_____/
                  | $$ \  $$|  $$$$$$$  |  $$$$/      | $$$$$$$$|  $$$$$$$|  $$$$$$$
                  |__/  \__/ \_______/   \___/        |________/ \____  $$ \_______/
                                                                 /$$  | $$
                                                                |  $$$$$$/
                                                                 \______/
                  
                            
                  
                  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣠⣤⢶⢲⢲⣿⢻⢻⡟⢻⡿⣷⣶⣶⣒⠒⠲⠤⠤⢤⣀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣼⣯⣿⣷⣾⣼⣼⣼⣿⣿⣿⣷⣿⣿⣿⣿⣿⣿⣿⣿⣶⣶⣦⣀⣉⠙⠲⠦⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⠀⠀⠀⠀⣤⣴⣿⣧⢸⣿⣿⣷⠿⠛⠋⠉⠀⠀⢀⡿⠀⠀⠀⠀⠙⢦⡈⠉⠉⠛⠛⠻⢿⣿⣿⣖⣿⣬⡉⠓⢦⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⢀⣀⣆⣾⣿⣿⣿⣿⠟⠋⠁⠀⠀⠀⠀⠀⠀⠀⢸⡇⠀⠀⠀⠀⢀⣼⣷⣶⣦⣄⠀⠀⠀⠀⠉⣟⠻⢿⣿⣧⡀⠈⠙⠒⠛⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⣾⣿⣷⣿⡿⠟⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡇⠲⠤⢤⣤⣿⣿⣿⣿⣿⣿⣷⣀⠀⠀⠀⣿⠀⠀⠈⠻⣿⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⢀⣿⣿⡍⠙⢷⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢷⠀⠀⠀⠀⠘⢿⣿⣿⣿⣿⡿⠉⢳⠀⢰⡏⠀⠀⠀⠀⠈⢻⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠈⢿⣿⣿⣦⠀⠈⢳⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⢧⡀⠀⠀⠀⠀⠈⠉⠉⠳⣄⣀⣼⣷⡟⠀⠀⠀⠀⠀⠀⠀⢻⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⣀⠈⠹⢿⣿⣳⣦⡀⠈⠙⣦⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠳⢤⣀⠀⠀⠀⠀⠀⠀⢀⣩⡴⠋⠀⠀⠀⠀⠀⠀⠀⠀⢸⠻⣆⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠻⣦⡀⠀⠹⣿⣷⣿⣷⣤⡈⠙⠳⠶⣄⣀⣀⡀⠀⠀⠀⠀⠀⠀⠉⠙⠛⠶⠶⠶⠛⠛⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⡿⠀⠙⣧⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⠘⠿⣦⣀⠀⠁⠻⢣⣿⣿⣷⣦⣜⢿⣶⡀⠙⠲⠶⠶⠶⣤⡀⠀⣠⣠⡀⠀⢀⣤⡴⢦⣤⣀⣠⣤⣀⠀⠀⠀⢀⡾⡃⠠⡀⠘⣦⠀⠀⠀⠀⠀⠀⠀
                  ⠀⠀⠀⠈⠙⠷⣤⣄⠀⠙⠺⠿⢿⣿⣷⠀⠀⠀⠀⣀⡀⠀⠀⠉⠙⣁⣉⡉⠛⠋⢁⣀⠘⢳⢉⣀⣀⣙⠳⢦⣤⣛⠀⠛⠶⣝⠀⠘⣦⡀⠀⠀⠀⠀⠀
                  ⠀⠀⠀⠀⠀⠀⠈⠙⠃⠀⠀⠀⠀⢀⡟⠀⢀⣴⠛⠉⠙⠛⠿⢿⡇⣺⡟⠛⠳⠤⠾⠛⠛⠛⠛⠁⠈⠉⠛⠿⠋⠉⠛⠛⠓⠾⠶⠦⣌⣳⡀⠀⠀⠀⠀
                  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡾⠁⠀⣸⠁⠀⠀⠀⠀⠀⣾⢰⡟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⠇⠀⠀⢿⠀⠀⠀⠀⠀⢸⡏⢹⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡄⠀⠀⢨⡇⠀⠀⠀⠀⠀⣧⢸⣷⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣀⣠⡾⠁⠀⠀⠀⠀⢠⡟⣼⠇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣾⢱⡏⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡿⣾⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡇⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                  ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣿⠇⠀⠀⠀

Net-Eye is a Python-based network reconnaissance tool designed to identify live hosts, resolve DNS, scan open ports, grab banners, perform GeoIP lookups, execute detailed Nmap scans, and check for vulnerabilities in discovered services.

Features

  • Live Host Discovery: Identify active hosts in a subnet using ICMP ping.
  • DNS Resolution: Resolve IP addresses to hostnames and vice versa.
  • Port Scanning: Identify open ports on the target.
  • Banner Grabbing: Collect service banners from open ports for analysis.
  • GeoIP Lookup: Retrieve geographical information for the target IP.
  • Detailed Nmap Scans: Perform advanced scans to detect service versions and operating systems.
  • Vulnerability Checks: Search for known vulnerabilities based on service name and version.

File Structure

.
├── net-eye.py
├── requirements.txt
├── scan_report_104_21_46_149.json
└── scan_report_8_8_8_8.json

Installation

  • Clone the repository:
git clone https://github.com/HTahir221486/NetEye
cd NetEye
  • Install dependencies:
pip install -r requirements.txt
  • Ensure Nmap is installed:
sudo snap install nmap

Usage

  • Run the tool using Python:
python net-eye.py
  • Input
Enter the target IP, hostname, or subnet (e.g., 192.168.1).
  • Output
Live hosts in the subnet.
Open ports and their banners.
GeoIP information.
Detailed Nmap scan results.
Vulnerability checks for discovered services.
The scan report is saved as a JSON file in the current directory, named scan_report_<target>.json.
  • Example

Input:

Enter target IP, hostname, or subnet (e.g., 192.168.1): 192.168.1

Output:

[INFO] Discovering live hosts...
[INFO] Resolving DNS...
[INFO] Scanning open ports...
[INFO] Performing GeoIP lookup...
[INFO] Performing detailed Nmap scan...
[INFO] Checking vulnerabilities...
[INFO] Scan completed. Report saved.

Generated report:

{
    "target": "192.168.1",
    "results": {
        "live_hosts": ["192.168.1.1", "192.168.1.2"],
        "dns_info": {"ip": "192.168.1.1", "hostname": "router.local"},
        "open_ports": [{"port": 80, "banner": "Apache 2.4.41"}, {"port": 22, "banner": "OpenSSH 7.6"}],
        "geoip": {"country_name": "United States", "latitude": 37.751, "longitude": -97.822},
        "nmap": [...],
        "vulnerabilities": ["CVE-2021-12345", "CVE-2020-67890"]
    }
}

Dependencies

Python 3.x
Nmap

Required Python packages (in requirements.txt):

socket
nmap
requests
json
subprocess
termcolor

About

NetEye is a python based scanning and enum tool that can scan networks, endpoints, and different hosts for open ports and potential vulnerabilities with some other feathers as well.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages