{"id":24762041,"url":"https://github.com/pranavh-2004/networkvisor","last_synced_at":"2025-07-12T16:37:42.868Z","repository":{"id":271102489,"uuid":"912353426","full_name":"Pranavh-2004/NetworkVisor","owner":"Pranavh-2004","description":"NetworkVisor is a network scanning tool that performs ARP, Ping, and Port scans to identify devices, live hosts, and open ports within a network.","archived":false,"fork":false,"pushed_at":"2025-01-05T13:55:34.000Z","size":9,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-23T13:17:05.773Z","etag":null,"topics":["cybersecurity","device-identification","network-scanning","port-scanning","protocols","python-based","security-tool"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Pranavh-2004.png","metadata":{"files":{"readme":"Readme.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-01-05T10:43:20.000Z","updated_at":"2025-01-06T04:53:11.000Z","dependencies_parsed_at":null,"dependency_job_id":"cfea440e-fbf2-478a-8784-29f82950dfc8","html_url":"https://github.com/Pranavh-2004/NetworkVisor","commit_stats":null,"previous_names":["pranavh-2004/networkvisor"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/Pranavh-2004/NetworkVisor","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Pranavh-2004%2FNetworkVisor","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Pranavh-2004%2FNetworkVisor/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Pranavh-2004%2FNetworkVisor/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Pranavh-2004%2FNetworkVisor/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Pranavh-2004","download_url":"https://codeload.github.com/Pranavh-2004/NetworkVisor/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Pranavh-2004%2FNetworkVisor/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":265024279,"owners_count":23699589,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cybersecurity","device-identification","network-scanning","port-scanning","protocols","python-based","security-tool"],"created_at":"2025-01-28T19:20:15.002Z","updated_at":"2025-07-12T16:37:42.852Z","avatar_url":"https://github.com/Pranavh-2004.png","language":"Python","readme":"# NetworkVisor\n\nNetworkVisor is a powerful and flexible network scanning tool designed to help users perform ARP scans, port scans, and ping sweeps to assess the status of devices and services on a network. This tool is designed for educational purposes and legitimate network security assessments with proper permissions.\n\n## Features\n\n- **ARP Scan**: Discover devices in the local network using ARP requests and retrieve their IP and MAC addresses.\n- **Port Scan**: Perform TCP and UDP port scans to identify open ports and services running on remote systems.\n- **Ping Sweep**: Perform a ping sweep to check which hosts are live on the network.\n\n## Disclaimer\n\nBy using this tool, you agree that you are solely responsible for the actions performed with it. This tool is intended solely for educational purposes and legitimate network security assessments within the bounds of applicable laws and regulations.\n\nYou must ensure that you have explicit permission from the network owner before scanning any network or system. Unauthorized scanning or network probing may be illegal in some countries and could result in legal consequences.\n\nThe creators and contributors of this project assume no responsibility for any misuse or damages resulting from the use of this tool.\n\n## Installation\n\n### Prerequisites\n\nMake sure you have Python 3.6 or higher installed. Additionally, you will need to install the requirements file.\n\n### Setting Up a Virtual Environment\n\nTo set up the project in a virtual environment, follow these steps:\n\n1. Create a virtual environment:\n\n```bash\npython3 -m venv .venv\n```\n\n2. Activate the virtual environment:\n\n- On macOS/Linux:\n\n```bash\nsource .venv/bin/activate\n```\n\n- On Windows:\n\n```bash\n.venv\\Scripts\\activate\n```\n\n3. Install the required dependencies:\n\n```bash\npip install -r requirements.txt\n```\n\n## Usage\n\n### Running NetworkVisor\n\nTo run NetworkVisor, use the following command structure:\n\n```bash\npython scripts/scanner.py -i \u003cTARGET_IP\u003e -t \u003cSCAN_TYPE\u003e [-p \u003cPORTS\u003e]\n```\n\n- -i \u003cTARGET_IP\u003e: The target IP or IP range for the scan (e.g., 192.168.1.1/24).\n- -t \u003cSCAN_TYPE\u003e: The type of scan to perform (arp, ping, or port).\n- -p \u003cPORTS\u003e: A comma-separated list of ports (only for port scan). For example, 80,443,22.\n\n### Example Commands\n\n1. Perform ARP scan:\n\n```bash\npython scripts/scanner.py -i 192.168.1.1/24 -t arp\n```\n\n2. Perform Ping sweep:\n\n```bash\npython scripts/scanner.py -i 192.168.1.1/24 -t ping\n```\n\n3. Perform TCP port scan:\n\n```bash\npython scripts/scanner.py -i 192.168.1.1 -t port -p 80,443,22\n```\n\n## Contributing\n\nWe welcome contributions to NetworkVisor! If you have an idea for an improvement or have found a bug, feel free to fork the repository, create a branch, and submit a pull request.\n\n### Steps to Contribute:\n\n1. Fork the repository.\n2. Create a new branch for your feature or fix.\n3. Make your changes.\n4. Write tests to verify your changes (if applicable).\n5. Submit a pull request with a detailed description of the changes.\n\n## License\n\nThis project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.\n\n## Acknowledgements\n\n- This project utilizes the Scapy library for network packet crafting and sniffing.\n- Thanks to the open-source community for their contributions to network security tools.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fpranavh-2004%2Fnetworkvisor","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fpranavh-2004%2Fnetworkvisor","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fpranavh-2004%2Fnetworkvisor/lists"}