Skip to content

Commit 85b7582

Browse files
committed
Rename to nrev
1 parent 42f2a6c commit 85b7582

File tree

5 files changed

+63
-63
lines changed

5 files changed

+63
-63
lines changed

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -278,7 +278,7 @@ jobs:
278278
steps:
279279
- uses: actions/checkout@v4
280280
with:
281-
repository: "shellrow/homebrew-tap-nemio"
281+
repository: "shellrow/homebrew-tap-nrev"
282282
token: ${{ secrets.HOMEBREW_TAP_TOKEN }}
283283
# So we have access to the formula
284284
- name: Fetch homebrew formulae

Cargo.toml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
[package]
2-
name = "nemio"
2+
name = "nrev"
33
version = "0.2.0"
44
edition = "2021"
55
authors = ["shellrow <[email protected]>"]
66
description = "Simple and Fast Network Mapper"
7-
repository = "https://github.com/shellrow/nemio"
8-
homepage = "https://github.com/shellrow/nemio"
9-
documentation = "https://github.com/shellrow/nemio"
7+
repository = "https://github.com/shellrow/nrev"
8+
homepage = "https://github.com/shellrow/nrev"
9+
documentation = "https://github.com/shellrow/nrev"
1010
readme = "README.md"
1111
keywords = ["network"]
1212
categories = ["network-programming"]
@@ -53,7 +53,7 @@ ci = "github"
5353
#installers = ["shell", "powershell", "homebrew"]
5454
installers = ["shell", "homebrew"]
5555
# A GitHub repo to push Homebrew formulas to
56-
tap = "shellrow/homebrew-tap-nemio"
56+
tap = "shellrow/homebrew-tap-nrev"
5757
# Target platforms to build apps for (Rust target-triple syntax)
5858
#targets = ["aarch64-apple-darwin", "x86_64-apple-darwin", "x86_64-unknown-linux-gnu", "x86_64-pc-windows-msvc"]
5959
targets = ["aarch64-apple-darwin", "x86_64-apple-darwin", "x86_64-unknown-linux-gnu"]

README.md

Lines changed: 48 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1-
[crates-badge]: https://img.shields.io/crates/v/nemio.svg
2-
[crates-url]: https://crates.io/crates/nemio
1+
[crates-badge]: https://img.shields.io/crates/v/nrev.svg
2+
[crates-url]: https://crates.io/crates/nrev
33

4-
# nemio [![Crates.io][crates-badge]][crates-url]
4+
# nrev [![Crates.io][crates-badge]][crates-url]
55
Simple and Fast Network Mapper. Written in Rust.
66
Designed to be used in network mapping, probe, and security tests.
77

@@ -23,52 +23,52 @@ Designed to be used in network mapping, probe, and security tests.
2323
### Install prebuilt binaries via shell script
2424

2525
```sh
26-
curl --proto '=https' --tlsv1.2 -LsSf https://github.com/shellrow/nemio/releases/latest/download/nemio-installer.sh | sh
26+
curl --proto '=https' --tlsv1.2 -LsSf https://github.com/shellrow/nrev/releases/latest/download/nrev-installer.sh | sh
2727
```
2828

2929
### Install prebuilt binaries via powershell script
3030

3131
```sh
32-
irm https://github.com/shellrow/nemio/releases/latest/download/nemio-installer.ps1 | iex
32+
irm https://github.com/shellrow/nrev/releases/latest/download/nrev-installer.ps1 | iex
3333
```
3434

3535
### Install prebuilt binaries via Homebrew
3636

3737
```sh
38-
brew install shellrow/tap-nemio/nemio
38+
brew install shellrow/tap-nrev/nrev
3939
```
4040

4141
### From Releases
42-
You can download archives of precompiled binaries from the [releases](https://github.com/shellrow/nemio/releases) .
42+
You can download archives of precompiled binaries from the [releases](https://github.com/shellrow/nrev/releases) .
4343

4444
### Cargo
45-
If you have Rust and the Cargo package manager installed on your system, you can install (download and build) `nemio` with the following command:
45+
If you have Rust and the Cargo package manager installed on your system, you can install (download and build) `nrev` with the following command:
4646
```
47-
cargo install nemio
47+
cargo install nrev
4848
```
4949

50-
Or you can use [binstall](https://github.com/cargo-bins/cargo-binstall) for install nemio from github release.
50+
Or you can use [binstall](https://github.com/cargo-bins/cargo-binstall) for install nrev from github release.
5151
```
52-
cargo binstall nemio
52+
cargo binstall nrev
5353
```
5454

5555
## Basic Usage
5656
### Default Port Scan
5757
To scan the default 1000 ports on a target, simply specify the target
5858
```
59-
nemio --target scanme.nmap.org
59+
nrev --target scanme.nmap.org
6060
```
6161

6262
Sub-commands and Options
6363
```
64-
Usage: nemio [OPTIONS] [COMMAND]
64+
Usage: nrev [OPTIONS] [COMMAND]
6565
6666
Commands:
67-
port Scan port. nemio port --help for more information
68-
host Scan host in specified network or host-list. nemio host --help for more information
69-
ping Ping to specified host. nemio ping --help for more information
70-
trace Traceroute to specified host. nemio trace --help for more information
71-
subdomain Find subdomains. nemio subdomain --help for more information
67+
port Scan port. nrev port --help for more information
68+
host Scan host in specified network or host-list. nrev host --help for more information
69+
ping Ping to specified host. nrev ping --help for more information
70+
trace Traceroute to specified host. nrev trace --help for more information
71+
subdomain Find subdomains. nrev subdomain --help for more information
7272
nei Resolve IP address to MAC address
7373
interfaces Show network interfaces
7474
interface Show default network interface
@@ -90,119 +90,119 @@ Options:
9090
### Port scan
9191
Scan default 1000 ports
9292
```
93-
nemio port scanme.nmap.org
93+
nrev port scanme.nmap.org
9494
```
9595

9696
Specify the ports
9797
```
98-
nemio port scanme.nmap.org --ports 22,80,443,5000,8080
98+
nrev port scanme.nmap.org --ports 22,80,443,5000,8080
9999
```
100100

101101
Specify the range
102102
```
103-
nemio port scanme.nmap.org --range 20-100
103+
nrev port scanme.nmap.org --range 20-100
104104
```
105105

106106
Scan well-known ports
107107
```
108-
nemio port scanme.nmap.org --wellknown
108+
nrev port scanme.nmap.org --wellknown
109109
```
110110

111111
#### Settings
112-
By default, nemio determines the waiting time until packet reception (before concluding the scan task) based on the results of the initial PING.
112+
By default, nrev determines the waiting time until packet reception (before concluding the scan task) based on the results of the initial PING.
113113
The initial PING is executed in the order of ICMP Ping, UDP Ping, TCP Ping (on port 80), and if successful, proceeds to the next scan task.
114-
If all PING attempts fail, nemio exits before executing the scan. This step can be skipped by setting the `--noping` flag.
115-
For other settings, please refer to `nemio port -h` for details.
114+
If all PING attempts fail, nrev exits before executing the scan. This step can be skipped by setting the `--noping` flag.
115+
For other settings, please refer to `nrev port -h` for details.
116116

117117
### Host scan
118118
ICMP Host scan
119119
```
120-
nemio host 192.168.1.0/24
120+
nrev host 192.168.1.0/24
121121
```
122122
```
123-
nemio host <path-to-host-list>
123+
nrev host <path-to-host-list>
124124
```
125125

126126
TCP Host scan
127127
```
128-
nemio host 192.168.1.0/24 -P TCP --port 80
128+
nrev host 192.168.1.0/24 -P TCP --port 80
129129
```
130130

131131
### Ping
132132
Default ICMP Ping
133133
```
134-
nemio ping 1.1.1.1
134+
nrev ping 1.1.1.1
135135
```
136136

137137
UDP Ping
138138
```
139-
nemio ping 1.1.1.1 -P UDP
139+
nrev ping 1.1.1.1 -P UDP
140140
```
141141

142142
TCP Ping
143143
```
144-
nemio ping 1.1.1.1:443 -P TCP
144+
nrev ping 1.1.1.1:443 -P TCP
145145
```
146146

147147
### Traceroute
148148
TCP Ping
149149
```
150-
nemio trace 8.8.8.8
150+
nrev trace 8.8.8.8
151151
```
152152

153153
You can specify the interval in milliseconds for faster trace.
154154
```
155-
nemio trace 8.8.8.8 --rate 500
155+
nrev trace 8.8.8.8 --rate 500
156156
```
157157

158158
### Subdomain scan
159159
```
160-
nemio subdomain google.com
160+
nrev subdomain google.com
161161
```
162162

163163
### Neighbor (ARP/NDP)
164164
```
165-
nemio nei 192.168.1.1
165+
nrev nei 192.168.1.1
166166
```
167167

168168
### Specify the network interface
169169
```
170-
nemio -i tun0 port 10.10.11.14
170+
nrev -i tun0 port 10.10.11.14
171171
```
172172

173173
## Privileges
174-
`nemio` uses a raw socket which require elevated privileges. Execute with administrator privileges.
174+
`nrev` uses a raw socket which require elevated privileges. Execute with administrator privileges.
175175

176176
### Note for Linux Users
177-
`nemio` requires elevated privileges to send/receive raw-packet. On Linux, you can configure these privileges using two main methods:
177+
`nrev` requires elevated privileges to send/receive raw-packet. On Linux, you can configure these privileges using two main methods:
178178

179179
#### 1. Using `setcap`
180180

181-
Granting capabilities to the `nemio` binary allows it to operate with the necessary privileges without requiring `sudo` for each execution.
181+
Granting capabilities to the `nrev` binary allows it to operate with the necessary privileges without requiring `sudo` for each execution.
182182
This method is recommended for single-user machines or in environments where all users are trusted.
183183

184-
Assign necessary capabilities to the nemio binary
184+
Assign necessary capabilities to the nrev binary
185185
```sh
186-
sudo setcap 'cap_sys_ptrace,cap_dac_read_search,cap_net_raw,cap_net_admin+ep' $(command -v nemio)
186+
sudo setcap 'cap_sys_ptrace,cap_dac_read_search,cap_net_raw,cap_net_admin+ep' $(command -v nrev)
187187
```
188188

189-
Run nemio as an unprivileged user:
189+
Run nrev as an unprivileged user:
190190
```sh
191-
nemio
191+
nrev
192192
```
193193

194194
#### Capabilities Explained:
195-
- `cap_sys_ptrace,cap_dac_read_search`: Allows `nemio` to access `/proc/<pid>/fd/` to identify which open port belongs to which process.
195+
- `cap_sys_ptrace,cap_dac_read_search`: Allows `nrev` to access `/proc/<pid>/fd/` to identify which open port belongs to which process.
196196
- `cap_net_raw,cap_net_admin`: Enables packet capturing capabilities.
197197

198198
#### 2. Using `sudo` (for multi-user environments)
199-
For environments with multiple users, requiring privilege escalation each time nemio is run can enhance security.
199+
For environments with multiple users, requiring privilege escalation each time nrev is run can enhance security.
200200
```
201-
sudo nemio
201+
sudo nrev
202202
```
203203

204204
### Note for macOS Users
205-
On macOS, managing access to the Berkeley Packet Filter (BPF) devices is necessary for `nemio` to send/receive raw-packet
205+
On macOS, managing access to the Berkeley Packet Filter (BPF) devices is necessary for `nrev` to send/receive raw-packet
206206
Alternatively, of course, you can also use `sudo` to temporarily grant the necessary permissions.
207207
#### Install `chmod-bpf` to automatically manage permissions for BPF devices:
208208

@@ -227,7 +227,7 @@ sudo chmod-bpf install
227227
```
228228

229229
### Note for Windows Users
230-
- Ensure that you have [Npcap](https://npcap.com/#download) installed, which is necessary for `nemio` to send/receive raw-packet on Windows
230+
- Ensure that you have [Npcap](https://npcap.com/#download) installed, which is necessary for `nrev` to send/receive raw-packet on Windows
231231
- Download and install Npcap from [Npcap](https://npcap.com/#download). Choose the "Install Npcap in WinPcap API-compatible Mode" during installation.
232232
- Build Dependencies:
233233
- Place the Packet.lib file from the [Npcap SDK](https://npcap.com/#download) or WinPcap Developers pack in a directory named lib at the root of this repository.

src/app.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@ use clap::{crate_name, crate_version, crate_description};
22
use crate::sys;
33

44
// APP information
5-
pub const CRATE_BIN_NAME: &str = "nemio";
5+
pub const CRATE_BIN_NAME: &str = "nrev";
66
pub const CRATE_UPDATE_DATE: &str = "2024-07-07";
7-
pub const CRATE_REPOSITORY: &str = "https://github.com/shellrow/nemio";
7+
pub const CRATE_REPOSITORY: &str = "https://github.com/shellrow/nrev";
88

99
pub enum AppCommands {
1010
PortScan,

src/main.rs

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ fn parse_args() -> ArgMatches {
132132
.value_parser(value_parser!(PathBuf))
133133
)
134134
.subcommand(Command::new("port")
135-
.about("Scan port. nemio port --help for more information")
135+
.about("Scan port. nrev port --help for more information")
136136
.arg(Arg::new("target")
137137
.help("Specify the target. IP address or Hostname")
138138
.value_name("target")
@@ -169,7 +169,7 @@ fn parse_args() -> ArgMatches {
169169
.num_args(0)
170170
)
171171
.arg(Arg::new("random")
172-
.help("Don't randomize targets. By default, nemio randomizes the order of targets.")
172+
.help("Don't randomize targets. By default, nrev randomizes the order of targets.")
173173
.short('R')
174174
.long("random")
175175
.num_args(0)
@@ -212,7 +212,7 @@ fn parse_args() -> ArgMatches {
212212
)
213213
)
214214
.subcommand(Command::new("host")
215-
.about("Scan host in specified network or host-list. nemio host --help for more information")
215+
.about("Scan host in specified network or host-list. nrev host --help for more information")
216216
.arg(Arg::new("target")
217217
.help("Specify the target network")
218218
.value_name("target")
@@ -233,7 +233,7 @@ fn parse_args() -> ArgMatches {
233233
.value_parser(value_parser!(u16))
234234
)
235235
.arg(Arg::new("random")
236-
.help("Don't randomize targets. By default, nemio randomizes the order of targets.")
236+
.help("Don't randomize targets. By default, nrev randomizes the order of targets.")
237237
.short('R')
238238
.long("random")
239239
.num_args(0)
@@ -259,7 +259,7 @@ fn parse_args() -> ArgMatches {
259259
)
260260
)
261261
.subcommand(Command::new("ping")
262-
.about("Ping to specified host. nemio ping --help for more information")
262+
.about("Ping to specified host. nrev ping --help for more information")
263263
.arg(Arg::new("target")
264264
.help("Specify the target. IP address or Hostname")
265265
.value_name("target")
@@ -314,7 +314,7 @@ fn parse_args() -> ArgMatches {
314314
)
315315
)
316316
.subcommand(Command::new("trace")
317-
.about("Traceroute to specified host. nemio trace --help for more information")
317+
.about("Traceroute to specified host. nrev trace --help for more information")
318318
.arg(Arg::new("target")
319319
.help("Specify the target. IP address or Hostname")
320320
.value_name("target")
@@ -355,7 +355,7 @@ fn parse_args() -> ArgMatches {
355355
)
356356
)
357357
.subcommand(Command::new("subdomain")
358-
.about("Find subdomains. nemio subdomain --help for more information")
358+
.about("Find subdomains. nrev subdomain --help for more information")
359359
.arg(Arg::new("target")
360360
.help("Specify the target apex-domain")
361361
.value_name("target")

0 commit comments

Comments
 (0)