{"id":15039058,"url":"https://github.com/owasp/nettacker","last_synced_at":"2025-05-12T13:08:49.844Z","repository":{"id":37245319,"uuid":"88980374","full_name":"OWASP/Nettacker","owner":"OWASP","description":"Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management","archived":false,"fork":false,"pushed_at":"2025-05-08T21:41:36.000Z","size":9120,"stargazers_count":3996,"open_issues_count":46,"forks_count":849,"subscribers_count":110,"default_branch":"master","last_synced_at":"2025-05-12T13:08:46.307Z","etag":null,"topics":["automation","bruteforce","cve","hacking-tools","information-gathering","network-security","owasp","penetration-testing","penetration-testing-framework","pentesting","pentesting-tools","portscanner","python","recon","scanner","security","security-tools","vulnerability-management","vulnerability-scanner","vulnerability-scanners"],"latest_commit_sha":null,"homepage":"https://owasp.org/nettacker","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/OWASP.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":".github/CODEOWNERS","security":"SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null},"funding":{"custom":"https://owasp.org/donate/?reponame=www-project-nettacker\u0026title=OWASP+Nettacker"}},"created_at":"2017-04-21T12:14:35.000Z","updated_at":"2025-05-12T12:06:44.000Z","dependencies_parsed_at":"2023-02-09T17:16:26.117Z","dependency_job_id":"963fd206-03f3-447c-8742-390ad508e9d4","html_url":"https://github.com/OWASP/Nettacker","commit_stats":{"total_commits":1973,"total_committers":59,"mean_commits":"33.440677966101696","dds":0.5022807906741004,"last_synced_commit":"1391affeb41c1b08e8486554522a698870b98660"},"previous_names":["zdresearch/owasp-nettacker"],"tags_count":13,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/OWASP%2FNettacker","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/OWASP%2FNettacker/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/OWASP%2FNettacker/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/OWASP%2FNettacker/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/OWASP","download_url":"https://codeload.github.com/OWASP/Nettacker/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":253745160,"owners_count":21957317,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["automation","bruteforce","cve","hacking-tools","information-gathering","network-security","owasp","penetration-testing","penetration-testing-framework","pentesting","pentesting-tools","portscanner","python","recon","scanner","security","security-tools","vulnerability-management","vulnerability-scanner","vulnerability-scanners"],"created_at":"2024-09-24T20:41:24.086Z","updated_at":"2025-05-12T13:08:49.832Z","avatar_url":"https://github.com/OWASP.png","language":"Python","readme":"OWASP Nettacker\n=========\n[![Build Status](https://github.com/OWASP/Nettacker/actions/workflows/ci_cd.yml/badge.svg?branch=master)](https://github.com/OWASP/Nettacker/actions/workflows/ci_cd.yml/badge.svg?branch=master)\n[![Apache License](https://img.shields.io/badge/License-Apache%20v2-green.svg)](https://github.com/OWASP/Nettacker/blob/master/LICENSE)\n[![Twitter](https://img.shields.io/badge/Twitter-@iotscan-blue.svg)](https://twitter.com/iotscan)\n![GitHub contributors](https://img.shields.io/github/contributors/OWASP/Nettacker)\n[![Documentation Status](https://readthedocs.org/projects/nettacker/badge/?version=latest)](https://nettacker.readthedocs.io/en/latest/?badge=latest)\n[![repo size ](https://img.shields.io/github/repo-size/OWASP/Nettacker)](https://github.com/OWASP/Nettacker)\n[![Docker Pulls](https://img.shields.io/docker/pulls/owasp/nettacker)](https://hub.docker.com/r/owasp/nettacker)\n\n\n\u003cimg src=\"https://raw.githubusercontent.com/OWASP/Nettacker/master/nettacker/web/static/img/owasp-nettacker.png\" width=\"200\"\u003e\u003cimg src=\"https://raw.githubusercontent.com/OWASP/Nettacker/master/nettacker/web/static/img/owasp.png\" width=\"500\"\u003e\n\n\n**DISCLAIMER**\n\n* ***THIS SOFTWARE WAS CREATED FOR AUTOMATED PENETRATION TESTING AND INFORMATION GATHERING. YOU MUST USE THIS SOFTWARE IN A RESPONSIBLE AND ETHICAL MANNER. DO NOT TARGET SYSTEMS OR APPLICATIONS WITHOUT OBTAINING PERMISSIONS OR CONSENT FROM THE SYSTEM OWNERS OR ADMINISTRATORS. CONTRIBUTORS WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.***\n\n![2018-01-19_0-45-07](https://user-images.githubusercontent.com/7676267/35123376-283d5a3e-fcb7-11e7-9b1c-92b78ed4fecc.gif)\n\nOWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software **will** utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanners making it one of the best.\n\n\n* OWASP Page: https://owasp.org/www-project-nettacker/\n* Wiki: https://github.com/OWASP/Nettacker/wiki\n* Slack: #project-nettacker on https://owasp.slack.com\n* Installation: https://github.com/OWASP/Nettacker/wiki/Installation\n* Usage: https://github.com/OWASP/Nettacker/wiki/Usage\n* GitHub: https://github.com/OWASP/Nettacker\n* Docker Image: https://hub.docker.com/r/owasp/nettacker\n* How to use the Dockerfile: https://github.com/OWASP/Nettacker/wiki/Installation#docker\n* OpenHub: https://www.openhub.net/p/OWASP-Nettacker\n* **Donate**: https://owasp.org/donate/?reponame=www-project-nettacker\u0026title=OWASP+Nettacker\n* **Read More**: https://www.secologist.com/open-source-projects\n\n____________\nQuick Setup \u0026 Run\n============\n```bash\n$ docker-compose up -d \u0026\u0026 docker exec -it nettacker-nettacker-1 /bin/bash\n# poetry run python nettacker.py -i owasp.org -s -m port_scan\n```\n* Results are accessible from your (https://localhost:5000) or https://nettacker-api.z3r0d4y.com:5000/ (pointed to your localhost)\n* The local database is `.data/nettacker.db` (sqlite).\n* Default results path is `.data/results`\n* `docker-compose` will share your nettacker folder, so you will not lose any data after `docker-compose down`\n* To see the API key in you can run `docker logs nettacker_nettacker_1`.\n* More details and setup without docker https://github.com/OWASP/Nettacker/wiki/Installation\n_____________\nThanks to our awesome contributors\n============\n![Awesome Contributors](https://contrib.rocks/image?repo=OWASP/Nettacker)\n\n## Adopters\n\nWe’re grateful to the organizations, community projects, and individuals who adopt and rely on OWASP Nettacker for their security workflows.\n\nIf you’re using OWASP Nettacker in your organization or project, we’d love to hear from you! Feel free to add your details to the [ADOPTERS.md](ADOPTERS.md) file by submitting a pull request or reach out to us via GitHub issues. Let’s showcase how Nettacker is making a difference in the security community!\n\n See [ADOPTERS.md](ADOPTERS.md) for details.\n\n_____________\n\n## ***IoT Scanner***\n*\tPython Multi Thread \u0026 Multi Process Network Information Gathering Vulnerability Scanner\n*\tService and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and many more… ) \n*\tAsset Discovery \u0026 Network Service Analysis\n*\tServices Brute Force Testing\n*\tServices Vulnerability Testing\n*\tHTTP/HTTPS Crawling, Fuzzing, Information Gathering and … \n*\tHTML, JSON, CSV and Text Outputs\n* API \u0026 WebUI\n*\tThis project is at the moment in research and development phase \n* Thanks to Google Summer of Code Initiative and all the students who contributed to this project during their summer breaks: \n\n\n\u003cimg src=\"https://betanews.com/wp-content/uploads/2016/03/vertical-GSoC-logo.jpg\" width=\"200\"\u003e\u003c/img\u003e\n\n_____________\n## Stargazers over time\n\n[![Stargazers over time](https://starchart.cc/OWASP/Nettacker.svg)](https://starchart.cc/OWASP/Nettacker)\n\n\n","funding_links":["https://owasp.org/donate/?reponame=www-project-nettacker\u0026title=OWASP+Nettacker"],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fowasp%2Fnettacker","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fowasp%2Fnettacker","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fowasp%2Fnettacker/lists"}