An open API service indexing awesome lists of open source software.

https://github.com/iabdullah215/neteye

NetEye is a python based scanning and enum tool that can scan networks, endpoints, and different hosts for open ports and potential vulnerabilities with some other feathers as well.
https://github.com/iabdullah215/neteye

host-scanner network-scanner reconnaissance

Last synced: 2 months ago
JSON representation

NetEye is a python based scanning and enum tool that can scan networks, endpoints, and different hosts for open ports and potential vulnerabilities with some other feathers as well.

Awesome Lists containing this project

README

        

```jsx
/$$ /$$ /$$| /$$$$$$$$|
| $$$ | $$ | $$ | $$_____/
| $$$$| $$ /$$$$$$ /$$$$$$ | $$ /$$ /$$ /$$$$$$
| $$ $$ $$ /$$__ $$|_ $$_/ | $$$$$ | $$ | $$ /$$__ $$
| $$ $$$$| $$$$$$$$ | $$ | $$__/ | $$ | $$| $$$$$$$$
| $$\ $$$| $$_____/ | $$ /$$ | $$ | $$ | $$| $$_____/
| $$ \ $$| $$$$$$$ | $$$$/ | $$$$$$$$| $$$$$$$| $$$$$$$
|__/ \__/ \_______/ \___/ |________/ \____ $$ \_______/
/$$ | $$
| $$$$$$/
\______/



⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣠⣤⢶⢲⢲⣿⢻⢻⡟⢻⡿⣷⣶⣶⣒⠒⠲⠤⠤⢤⣀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣼⣯⣿⣷⣾⣼⣼⣼⣿⣿⣿⣷⣿⣿⣿⣿⣿⣿⣿⣿⣶⣶⣦⣀⣉⠙⠲⠦⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⣤⣴⣿⣧⢸⣿⣿⣷⠿⠛⠋⠉⠀⠀⢀⡿⠀⠀⠀⠀⠙⢦⡈⠉⠉⠛⠛⠻⢿⣿⣿⣖⣿⣬⡉⠓⢦⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⢀⣀⣆⣾⣿⣿⣿⣿⠟⠋⠁⠀⠀⠀⠀⠀⠀⠀⢸⡇⠀⠀⠀⠀⢀⣼⣷⣶⣦⣄⠀⠀⠀⠀⠉⣟⠻⢿⣿⣧⡀⠈⠙⠒⠛⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⣾⣿⣷⣿⡿⠟⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡇⠲⠤⢤⣤⣿⣿⣿⣿⣿⣿⣷⣀⠀⠀⠀⣿⠀⠀⠈⠻⣿⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⢀⣿⣿⡍⠙⢷⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢷⠀⠀⠀⠀⠘⢿⣿⣿⣿⣿⡿⠉⢳⠀⢰⡏⠀⠀⠀⠀⠈⢻⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠈⢿⣿⣿⣦⠀⠈⢳⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⢧⡀⠀⠀⠀⠀⠈⠉⠉⠳⣄⣀⣼⣷⡟⠀⠀⠀⠀⠀⠀⠀⢻⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⣀⠈⠹⢿⣿⣳⣦⡀⠈⠙⣦⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠳⢤⣀⠀⠀⠀⠀⠀⠀⢀⣩⡴⠋⠀⠀⠀⠀⠀⠀⠀⠀⢸⠻⣆⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠻⣦⡀⠀⠹⣿⣷⣿⣷⣤⡈⠙⠳⠶⣄⣀⣀⡀⠀⠀⠀⠀⠀⠀⠉⠙⠛⠶⠶⠶⠛⠛⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⡿⠀⠙⣧⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠘⠿⣦⣀⠀⠁⠻⢣⣿⣿⣷⣦⣜⢿⣶⡀⠙⠲⠶⠶⠶⣤⡀⠀⣠⣠⡀⠀⢀⣤⡴⢦⣤⣀⣠⣤⣀⠀⠀⠀⢀⡾⡃⠠⡀⠘⣦⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠈⠙⠷⣤⣄⠀⠙⠺⠿⢿⣿⣷⠀⠀⠀⠀⣀⡀⠀⠀⠉⠙⣁⣉⡉⠛⠋⢁⣀⠘⢳⢉⣀⣀⣙⠳⢦⣤⣛⠀⠛⠶⣝⠀⠘⣦⡀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠈⠙⠃⠀⠀⠀⠀⢀⡟⠀⢀⣴⠛⠉⠙⠛⠿⢿⡇⣺⡟⠛⠳⠤⠾⠛⠛⠛⠛⠁⠈⠉⠛⠿⠋⠉⠛⠛⠓⠾⠶⠦⣌⣳⡀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡾⠁⠀⣸⠁⠀⠀⠀⠀⠀⣾⢰⡟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⠇⠀⠀⢿⠀⠀⠀⠀⠀⢸⡏⢹⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡄⠀⠀⢨⡇⠀⠀⠀⠀⠀⣧⢸⣷⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣀⣠⡾⠁⠀⠀⠀⠀⢠⡟⣼⠇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣾⢱⡏⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡿⣾⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡇⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣿⠇⠀⠀⠀
```

Net-Eye is a Python-based network reconnaissance tool designed to identify live hosts, resolve DNS, scan open ports, grab banners, perform GeoIP lookups, execute detailed Nmap scans, and check for vulnerabilities in discovered services.

## Features

- **Live Host Discovery**: Identify active hosts in a subnet using ICMP ping.
- **DNS Resolution**: Resolve IP addresses to hostnames and vice versa.
- **Port Scanning**: Identify open ports on the target.
- **Banner Grabbing**: Collect service banners from open ports for analysis.
- **GeoIP Lookup**: Retrieve geographical information for the target IP.
- **Detailed Nmap Scans**: Perform advanced scans to detect service versions and operating systems.
- **Vulnerability Checks**: Search for known vulnerabilities based on service name and version.

## File Structure

```console
.
├── net-eye.py
├── requirements.txt
├── scan_report_104_21_46_149.json
└── scan_report_8_8_8_8.json
```

## Installation

- **Clone the repository:**

```bash
git clone https://github.com/HTahir221486/NetEye
cd NetEye
```

- **Install dependencies:**

```bash
pip install -r requirements.txt
```

- **Ensure Nmap is installed:**

```bash
sudo snap install nmap
```

## Usage

- Run the tool using Python:

```bash
python net-eye.py
```

- Input

```console
Enter the target IP, hostname, or subnet (e.g., 192.168.1).
```

- Output

```console
Live hosts in the subnet.
Open ports and their banners.
GeoIP information.
Detailed Nmap scan results.
Vulnerability checks for discovered services.
The scan report is saved as a JSON file in the current directory, named scan_report_.json.
```

- Example

**Input:**

```bash
Enter target IP, hostname, or subnet (e.g., 192.168.1): 192.168.1
```

**Output:**

```console
[INFO] Discovering live hosts...
[INFO] Resolving DNS...
[INFO] Scanning open ports...
[INFO] Performing GeoIP lookup...
[INFO] Performing detailed Nmap scan...
[INFO] Checking vulnerabilities...
[INFO] Scan completed. Report saved.
```

**Generated report:**

```json
{
"target": "192.168.1",
"results": {
"live_hosts": ["192.168.1.1", "192.168.1.2"],
"dns_info": {"ip": "192.168.1.1", "hostname": "router.local"},
"open_ports": [{"port": 80, "banner": "Apache 2.4.41"}, {"port": 22, "banner": "OpenSSH 7.6"}],
"geoip": {"country_name": "United States", "latitude": 37.751, "longitude": -97.822},
"nmap": [...],
"vulnerabilities": ["CVE-2021-12345", "CVE-2020-67890"]
}
}
```
**Dependencies**

```console
Python 3.x
Nmap
```

**Required Python packages (in requirements.txt):**

```console
socket
nmap
requests
json
subprocess
termcolor
```