{"id":13450127,"url":"https://github.com/OWASP/Nettacker","last_synced_at":"2025-03-23T16:30:57.559Z","repository":{"id":37245319,"uuid":"88980374","full_name":"OWASP/Nettacker","owner":"OWASP","description":"Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management","archived":false,"fork":false,"pushed_at":"2024-10-27T16:50:54.000Z","size":9397,"stargazers_count":3534,"open_issues_count":30,"forks_count":765,"subscribers_count":110,"default_branch":"master","last_synced_at":"2024-10-29T12:00:43.960Z","etag":null,"topics":["automation","bruteforce","cve","cves","hacking-tools","information-gathering","network-analysis","owasp","penetration-testing","penetration-testing-framework","pentesting","pentesting-tools","portscanner","python","scanner","security","security-tools","vulnerability-management","vulnerability-scanner","vulnerability-scanners"],"latest_commit_sha":null,"homepage":"https://owasp.org/www-project-nettacker/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/OWASP.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":".github/CODEOWNERS","security":"SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null},"funding":{"custom":"https://owasp.org/donate/?reponame=www-project-nettacker\u0026title=OWASP+Nettacker"}},"created_at":"2017-04-21T12:14:35.000Z","updated_at":"2024-10-29T06:44:08.000Z","dependencies_parsed_at":"2023-02-09T17:16:26.117Z","dependency_job_id":"963fd206-03f3-447c-8742-390ad508e9d4","html_url":"https://github.com/OWASP/Nettacker","commit_stats":{"total_commits":1973,"total_committers":59,"mean_commits":"33.440677966101696","dds":0.5022807906741004,"last_synced_commit":"1391affeb41c1b08e8486554522a698870b98660"},"previous_names":["zdresearch/owasp-nettacker"],"tags_count":13,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/OWASP%2FNettacker","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/OWASP%2FNettacker/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/OWASP%2FNettacker/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/OWASP%2FNettacker/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/OWASP","download_url":"https://codeload.github.com/OWASP/Nettacker/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":234300480,"owners_count":18810610,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["automation","bruteforce","cve","cves","hacking-tools","information-gathering","network-analysis","owasp","penetration-testing","penetration-testing-framework","pentesting","pentesting-tools","portscanner","python","scanner","security","security-tools","vulnerability-management","vulnerability-scanner","vulnerability-scanners"],"created_at":"2024-07-31T07:00:31.114Z","updated_at":"2025-03-23T16:30:57.518Z","avatar_url":"https://github.com/OWASP.png","language":"Python","readme":"OWASP Nettacker\n=========\n[![Build Status](https://github.com/OWASP/Nettacker/workflows/CI/badge.svg?branch=master)](https://github.com/OWASP/Nettacker/actions/workflows/CI.yml)\n[![Apache License](https://img.shields.io/badge/License-Apache%20v2-green.svg)](https://github.com/OWASP/Nettacker/blob/master/LICENSE)\n[![Twitter](https://img.shields.io/badge/Twitter-@iotscan-blue.svg)](https://twitter.com/iotscan)\n![GitHub contributors](https://img.shields.io/github/contributors/OWASP/Nettacker)\n[![Documentation Status](https://readthedocs.org/projects/nettacker/badge/?version=latest)](https://nettacker.readthedocs.io/en/latest/?badge=latest)\n[![repo size ](https://img.shields.io/github/repo-size/OWASP/Nettacker)](https://github.com/OWASP/Nettacker)\n[![Docker Pulls](https://img.shields.io/docker/pulls/owasp/nettacker)](https://hub.docker.com/r/owasp/nettacker)\n\n\n\u003cimg src=\"https://raw.githubusercontent.com/OWASP/Nettacker/master/nettacker/web/static/img/owasp-nettacker.png\" width=\"200\"\u003e\u003cimg src=\"https://raw.githubusercontent.com/OWASP/Nettacker/master/nettacker/web/static/img/owasp.png\" width=\"500\"\u003e\n\n\n**DISCLAIMER**\n\n* ***THIS SOFTWARE WAS CREATED FOR AUTOMATED PENETRATION TESTING AND INFORMATION GATHERING. YOU MUST USE THIS SOFTWARE IN A RESPONSIBLE AND ETHICAL MANNER. DO NOT TARGET SYSTEMS OR APPLICATIONS WITHOUT OBTAINING PERMISSIONS OR CONSENT FROM THE SYSTEM OWNERS OR ADMINISTRATORS. CONTRIBUTORS WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.***\n\n![2018-01-19_0-45-07](https://user-images.githubusercontent.com/7676267/35123376-283d5a3e-fcb7-11e7-9b1c-92b78ed4fecc.gif)\n\nOWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software **will** utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanners making it one of the best.\n\n\n* OWASP Page: https://owasp.org/www-project-nettacker/\n* Wiki: https://github.com/OWASP/Nettacker/wiki\n* Slack: #project-nettacker on https://owasp.slack.com\n* Installation: https://github.com/OWASP/Nettacker/wiki/Installation\n* Usage: https://github.com/OWASP/Nettacker/wiki/Usage\n* GitHub: https://github.com/OWASP/Nettacker\n* Docker Image: https://hub.docker.com/r/owasp/nettacker\n* How to use the Dockerfile: https://github.com/OWASP/Nettacker/wiki/Installation#docker\n* OpenHub: https://www.openhub.net/p/OWASP-Nettacker\n* **Donate**: https://owasp.org/donate/?reponame=www-project-nettacker\u0026title=OWASP+Nettacker\n* **Read More**: https://www.secologist.com/open-source-projects\n\n____________\nQuick Setup \u0026 Run\n============\n```bash\n$ docker-compose up -d \u0026\u0026 docker exec -it nettacker-nettacker-1 /bin/bash\n# poetry run python nettacker.py -i owasp.org -s -m port_scan\n```\n* Results are accessible from your (https://localhost:5000) or https://nettacker-api.z3r0d4y.com:5000/ (pointed to your localhost)\n* The local database is `.data/nettacker.db` (sqlite).\n* Default results path is `.data/results`\n* `docker-compose` will share your nettacker folder, so you will not lose any data after `docker-compose down`\n* To see the API key in you can run `docker logs nettacker_nettacker_1`.\n* More details and setup without docker https://github.com/OWASP/Nettacker/wiki/Installation\n_____________\nThanks to our awesome contributors\n============\n![Awesome Contributors](https://contrib.rocks/image?repo=OWASP/Nettacker)\n_____________\n\n## ***IoT Scanner***\n*\tPython Multi Thread \u0026 Multi Process Network Information Gathering Vulnerability Scanner\n*\tService and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and many more… ) \n*\tAsset Discovery \u0026 Network Service Analysis\n*\tServices Brute Force Testing\n*\tServices Vulnerability Testing\n*\tHTTP/HTTPS Crawling, Fuzzing, Information Gathering and … \n*\tHTML, JSON, CSV and Text Outputs\n* API \u0026 WebUI\n*\tThis project is at the moment in research and development phase \n* Thanks to Google Summer of Code Initiative and all the students who contributed to this project during their summer breaks: \n\n\n\u003cimg src=\"https://betanews.com/wp-content/uploads/2016/03/vertical-GSoC-logo.jpg\" width=\"200\"\u003e\u003c/img\u003e\n\n_____________\n## Stargazers over time\n\n[![Stargazers over time](https://starchart.cc/OWASP/Nettacker.svg)](https://starchart.cc/OWASP/Nettacker)\n\n\n","funding_links":["https://owasp.org/donate/?reponame=www-project-nettacker\u0026title=OWASP+Nettacker"],"categories":["pyPentesting","Python","Python (1887)","Security Tools","HarmonyOS","漏洞库_漏洞靶场","automation","security-tools"],"sub_categories":["Interfaces","Windows Manager","资源传输下载"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FOWASP%2FNettacker","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FOWASP%2FNettacker","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FOWASP%2FNettacker/lists"}