https://github.com/iabdullah215/neteye
NetEye is a python based scanning and enum tool that can scan networks, endpoints, and different hosts for open ports and potential vulnerabilities with some other feathers as well.
https://github.com/iabdullah215/neteye
host-scanner network-scanner reconnaissance
Last synced: 2 months ago
JSON representation
NetEye is a python based scanning and enum tool that can scan networks, endpoints, and different hosts for open ports and potential vulnerabilities with some other feathers as well.
- Host: GitHub
- URL: https://github.com/iabdullah215/neteye
- Owner: iabdullah215
- Created: 2025-01-04T08:15:05.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2025-01-04T08:18:04.000Z (5 months ago)
- Last Synced: 2025-01-18T16:58:54.141Z (4 months ago)
- Topics: host-scanner, network-scanner, reconnaissance
- Language: Python
- Homepage:
- Size: 9.77 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
```jsx
/$$ /$$ /$$| /$$$$$$$$|
| $$$ | $$ | $$ | $$_____/
| $$$$| $$ /$$$$$$ /$$$$$$ | $$ /$$ /$$ /$$$$$$
| $$ $$ $$ /$$__ $$|_ $$_/ | $$$$$ | $$ | $$ /$$__ $$
| $$ $$$$| $$$$$$$$ | $$ | $$__/ | $$ | $$| $$$$$$$$
| $$\ $$$| $$_____/ | $$ /$$ | $$ | $$ | $$| $$_____/
| $$ \ $$| $$$$$$$ | $$$$/ | $$$$$$$$| $$$$$$$| $$$$$$$
|__/ \__/ \_______/ \___/ |________/ \____ $$ \_______/
/$$ | $$
| $$$$$$/
\______/
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣠⣤⢶⢲⢲⣿⢻⢻⡟⢻⡿⣷⣶⣶⣒⠒⠲⠤⠤⢤⣀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣼⣯⣿⣷⣾⣼⣼⣼⣿⣿⣿⣷⣿⣿⣿⣿⣿⣿⣿⣿⣶⣶⣦⣀⣉⠙⠲⠦⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⣤⣴⣿⣧⢸⣿⣿⣷⠿⠛⠋⠉⠀⠀⢀⡿⠀⠀⠀⠀⠙⢦⡈⠉⠉⠛⠛⠻⢿⣿⣿⣖⣿⣬⡉⠓⢦⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⢀⣀⣆⣾⣿⣿⣿⣿⠟⠋⠁⠀⠀⠀⠀⠀⠀⠀⢸⡇⠀⠀⠀⠀⢀⣼⣷⣶⣦⣄⠀⠀⠀⠀⠉⣟⠻⢿⣿⣧⡀⠈⠙⠒⠛⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⣾⣿⣷⣿⡿⠟⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡇⠲⠤⢤⣤⣿⣿⣿⣿⣿⣿⣷⣀⠀⠀⠀⣿⠀⠀⠈⠻⣿⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⢀⣿⣿⡍⠙⢷⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢷⠀⠀⠀⠀⠘⢿⣿⣿⣿⣿⡿⠉⢳⠀⢰⡏⠀⠀⠀⠀⠈⢻⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠈⢿⣿⣿⣦⠀⠈⢳⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⢧⡀⠀⠀⠀⠀⠈⠉⠉⠳⣄⣀⣼⣷⡟⠀⠀⠀⠀⠀⠀⠀⢻⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⣀⠈⠹⢿⣿⣳⣦⡀⠈⠙⣦⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠳⢤⣀⠀⠀⠀⠀⠀⠀⢀⣩⡴⠋⠀⠀⠀⠀⠀⠀⠀⠀⢸⠻⣆⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠻⣦⡀⠀⠹⣿⣷⣿⣷⣤⡈⠙⠳⠶⣄⣀⣀⡀⠀⠀⠀⠀⠀⠀⠉⠙⠛⠶⠶⠶⠛⠛⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⡿⠀⠙⣧⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠘⠿⣦⣀⠀⠁⠻⢣⣿⣿⣷⣦⣜⢿⣶⡀⠙⠲⠶⠶⠶⣤⡀⠀⣠⣠⡀⠀⢀⣤⡴⢦⣤⣀⣠⣤⣀⠀⠀⠀⢀⡾⡃⠠⡀⠘⣦⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠈⠙⠷⣤⣄⠀⠙⠺⠿⢿⣿⣷⠀⠀⠀⠀⣀⡀⠀⠀⠉⠙⣁⣉⡉⠛⠋⢁⣀⠘⢳⢉⣀⣀⣙⠳⢦⣤⣛⠀⠛⠶⣝⠀⠘⣦⡀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠈⠙⠃⠀⠀⠀⠀⢀⡟⠀⢀⣴⠛⠉⠙⠛⠿⢿⡇⣺⡟⠛⠳⠤⠾⠛⠛⠛⠛⠁⠈⠉⠛⠿⠋⠉⠛⠛⠓⠾⠶⠦⣌⣳⡀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡾⠁⠀⣸⠁⠀⠀⠀⠀⠀⣾⢰⡟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⠇⠀⠀⢿⠀⠀⠀⠀⠀⢸⡏⢹⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡄⠀⠀⢨⡇⠀⠀⠀⠀⠀⣧⢸⣷⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣀⣠⡾⠁⠀⠀⠀⠀⢠⡟⣼⠇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣾⢱⡏⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡿⣾⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡇⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣿⠇⠀⠀⠀
```Net-Eye is a Python-based network reconnaissance tool designed to identify live hosts, resolve DNS, scan open ports, grab banners, perform GeoIP lookups, execute detailed Nmap scans, and check for vulnerabilities in discovered services.
## Features
- **Live Host Discovery**: Identify active hosts in a subnet using ICMP ping.
- **DNS Resolution**: Resolve IP addresses to hostnames and vice versa.
- **Port Scanning**: Identify open ports on the target.
- **Banner Grabbing**: Collect service banners from open ports for analysis.
- **GeoIP Lookup**: Retrieve geographical information for the target IP.
- **Detailed Nmap Scans**: Perform advanced scans to detect service versions and operating systems.
- **Vulnerability Checks**: Search for known vulnerabilities based on service name and version.## File Structure
```console
.
├── net-eye.py
├── requirements.txt
├── scan_report_104_21_46_149.json
└── scan_report_8_8_8_8.json
```## Installation
- **Clone the repository:**
```bash
git clone https://github.com/HTahir221486/NetEye
cd NetEye
```- **Install dependencies:**
```bash
pip install -r requirements.txt
```- **Ensure Nmap is installed:**
```bash
sudo snap install nmap
```## Usage
- Run the tool using Python:
```bash
python net-eye.py
```- Input
```console
Enter the target IP, hostname, or subnet (e.g., 192.168.1).
```- Output
```console
Live hosts in the subnet.
Open ports and their banners.
GeoIP information.
Detailed Nmap scan results.
Vulnerability checks for discovered services.
The scan report is saved as a JSON file in the current directory, named scan_report_.json.
```- Example
**Input:**
```bash
Enter target IP, hostname, or subnet (e.g., 192.168.1): 192.168.1
```**Output:**
```console
[INFO] Discovering live hosts...
[INFO] Resolving DNS...
[INFO] Scanning open ports...
[INFO] Performing GeoIP lookup...
[INFO] Performing detailed Nmap scan...
[INFO] Checking vulnerabilities...
[INFO] Scan completed. Report saved.
```**Generated report:**
```json
{
"target": "192.168.1",
"results": {
"live_hosts": ["192.168.1.1", "192.168.1.2"],
"dns_info": {"ip": "192.168.1.1", "hostname": "router.local"},
"open_ports": [{"port": 80, "banner": "Apache 2.4.41"}, {"port": 22, "banner": "OpenSSH 7.6"}],
"geoip": {"country_name": "United States", "latitude": 37.751, "longitude": -97.822},
"nmap": [...],
"vulnerabilities": ["CVE-2021-12345", "CVE-2020-67890"]
}
}
```
**Dependencies**```console
Python 3.x
Nmap
```**Required Python packages (in requirements.txt):**
```console
socket
nmap
requests
json
subprocess
termcolor
```