Skip to content

A lightweight, cross-platform CLI cybersecurity toolkit for network reconnaissance and security testing. Designed for penetration testers, security professionals, and network administrators.

Notifications You must be signed in to change notification settings

Panda-0x01/neoNet

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

neoNet

    ███╗   ██╗███████╗ ██████╗ ███╗   ██╗███████╗████████╗
    ████╗  ██║██╔════╝██╔═══██╗████╗  ██║██╔════╝╚══██╔══╝
    ██╔██╗ ██║█████╗  ██║   ██║██╔██╗ ██║█████╗     ██║   
    ██║╚██╗██║██╔══╝  ██║   ██║██║╚██╗██║██╔══╝     ██║   
    ██║ ╚████║███████╗╚██████╔╝██║ ╚████║███████╗   ██║   
    ╚═╝  ╚═══╝╚══════╝ ╚═════╝ ╚═╝  ╚═══╝╚══════╝   ╚═╝   
                                                            
    Network Reconnaissance & Security Toolkit

A lightweight, cross-platform CLI cybersecurity toolkit for network reconnaissance and security testing. Designed for penetration testers, security professionals, and network administrators.

✨ Features

  • 🔍 Nmap Scanner - Port scanning with multiple scan modes
  • 🌐 DNS Lookup - Hostname to IP and reverse DNS resolution
  • 📦 Packet Sniffer - Real-time network packet capture and analysis
  • 🎨 Beautiful UI - ANSI-colored terminal interface
  • 🖥️ Cross-Platform - Works on Windows, Linux, and macOS
  • 🚀 Zero Dependencies - Pure Python 3 implementation

📋 Requirements

System Requirements

  • Python 3.6 or higher
  • Operating System: Windows 10+, Linux (any distro), macOS

External Tools

  • Nmap - For port scanning functionality
  • TShark/Wireshark - For packet sniffing functionality

🚀 Installation

1. Clone or Download

# Clone the repository
git clone https://github.com/Panda-0x01/neoNet.git
cd neonet

# Or download neonet.py directly
wget https://raw.githubusercontent.com/Panda-0x01/neonet/main/neonet.py

2. Install Dependencies

🐧 Linux (Debian/Ubuntu/Kali)

# Install Nmap
sudo apt-get update
sudo apt-get install nmap

# Install TShark
sudo apt-get install tshark

# Allow non-root users to capture packets (optional)
sudo dpkg-reconfigure wireshark-common
sudo usermod -a -G wireshark $USER

🪟 Windows

  1. Install Nmap

  2. Install Wireshark (includes TShark)

🍎 macOS

# Using Homebrew
brew install nmap
brew install wireshark

# Or using MacPorts
sudo port install nmap
sudo port install wireshark

3. Make Executable (Linux/Mac)

chmod +x neonet.py

🎮 Usage

Basic Usage

Linux/Mac

# Run normally
python3 neonet.py

# Run with sudo for packet capture
sudo python3 neonet.py

# Or if executable
./neonet.py
sudo ./neonet.py

Windows

# Run normally
python neonet.py

# Run as Administrator (for packet capture)
# Right-click Command Prompt"Run as Administrator"
python neonet.py

Main Menu Options

[1] Nmap Scan          - Port scanning & host discovery
[2] DNS Lookup         - Resolve hostnames and IPs
[3] Packet Sniffing    - Capture network packets
[4] About              - Tool information & credits
[5] Exit               - Close neoNet

📖 Feature Guide

1. 🔍 Nmap Scanner

Perform network port scans with multiple scanning modes:

  • Quick Scan - Scans top 100 ports (fast)
  • Standard Scan - Scans top 1000 ports (balanced)
  • Aggressive Scan - OS and service detection (detailed)
  • Full Port Scan - Scans all 65535 ports (thorough)

Example Usage:

Select: [1] Nmap Scan
Enter target: scanme.nmap.org
Select scan type: [2] Standard Scan

2. 🌐 DNS Lookup

Resolve hostnames and perform reverse DNS lookups:

  • Hostname to IP - Get IP address from domain name
  • IP to Hostname - Get hostname from IP address

Example Usage:

Select: [2] DNS Lookup
Select lookup type: [1] Hostname to IP
Enter target: example.com
Result: IP Address: 93.184.216.34

3. 📦 Packet Sniffer

Capture and analyze network packets in real-time:

  • List available network interfaces
  • Capture specific number of packets or continuous
  • Display source/destination IPs and protocols
  • Press Ctrl+C to stop capture

Example Usage:

Select: [3] Packet Sniffing
Enter interface number: 1
Number of packets: 100
(Shows live packet capture)

🎨 Screenshots

Main Menu

    ███╗   ██╗███████╗ ██████╗ ███╗   ██╗███████╗████████╗
    ████╗  ██║██╔════╝██╔═══██╗████╗  ██║██╔════╝╚══██╔══╝
    ██╔██╗ ██║█████╗  ██║   ██║██╔██╗ ██║█████╗     ██║   
    ██║╚██╗██║██╔══╝  ██║   ██║██║╚██╗██║██╔══╝     ██║   
    ██║ ╚████║███████╗╚██████╔╝██║ ╚████║███████╗   ██║   
    ╚═╝  ╚═══╝╚══════╝ ╚═════╝ ╚═╝  ╚═══╝╚══════╝   ╚═╝   

    ┌─────────────────────────────────────────────────────┐
    │  Network Reconnaissance & Security Toolkit          │                                      
    └─────────────────────────────────────────────────────┘

⚙️ Configuration

Custom Nmap/TShark Paths

If tools are installed in non-standard locations, the script will automatically check:

Windows Default Paths:

  • Nmap: C:\Program Files (x86)\Nmap\nmap.exe
  • TShark: C:\Program Files\Wireshark\tshark.exe

Linux/Mac:

  • Uses which command to find tools in PATH

🔒 Security & Legal

⚠️ Important Disclaimer

This tool is for AUTHORIZED security testing ONLY.

  • ✅ Use only on networks and systems you own or have explicit permission to test
  • ✅ Obtain written authorization before performing security assessments
  • ✅ Comply with all applicable laws and regulations
  • ❌ Unauthorized access to computer systems is ILLEGAL
  • ❌ Port scanning without permission may violate laws

By using this tool, you agree to:

  • Use it responsibly and ethically
  • Accept full responsibility for your actions
  • Comply with all local, state, and federal laws

Ethical Use Guidelines

  1. Get Permission - Always obtain written authorization
  2. Stay in Scope - Only test authorized targets
  3. Document Everything - Keep records of your activities
  4. Report Findings - Disclose vulnerabilities responsibly
  5. Protect Data - Handle sensitive information securely

🐛 Troubleshooting

Common Issues

"Nmap is not installed"

"TShark is not installed"

"Permission denied" (Packet Capture)

  • Linux: Run with sudo python3 neonet.py
  • Windows: Run Command Prompt as Administrator
  • Linux Alternative: Add user to wireshark group

Colors not showing on Windows

  • Use Windows 10 or later
  • Use PowerShell or Windows Terminal (recommended)
  • Update to latest Windows version

"The system cannot find the file specified" (Windows)

  • Make sure Python 3 is installed
  • Check that Nmap/TShark are properly installed
  • Try adding tools to system PATH

Getting Help

If you encounter issues:

  1. Check the Issues page
  2. Search for similar problems
  3. Create a new issue with:
    • Your OS and version
    • Python version (python --version)
    • Error message (full text)
    • Steps to reproduce

🤝 Contributing

Contributions are welcome! Here's how you can help:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/AmazingFeature)
  3. Commit your changes (git commit -m 'Add some AmazingFeature')
  4. Push to the branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

Development Setup

git clone https://github.com/Panda-0x01/neoNet.git
cd neonet
# Make your changes
python3 neonet.py  # Test your changes

📝 License

This project is licensed under the MIT License - see the LICENSE file for details.

👨‍💻 Author

🙏 Acknowledgments

  • Nmap - The Network Mapper (https://nmap.org)
  • Wireshark - Network Protocol Analyzer (https://www.wireshark.org)
  • Python community for excellent documentation
  • Security researchers and ethical hackers worldwide

📚 Resources

Learn More

Related Tools

  • Metasploit - Penetration testing framework
  • Burp Suite - Web application security testing
  • Nikto - Web server scanner
  • Netcat - Network utility tool

🗺️ Roadmap

Planned Features

  • Save scan results to file (JSON/CSV/HTML)
  • Vulnerability scanning integration
  • Network mapping visualization
  • Multi-threaded scanning
  • Custom Nmap script support
  • Packet filtering options
  • Historical scan comparison
  • Config file support
  • Plugin system

📊 Version History

v1.0.0 (Current)

  • ✅ Initial release
  • ✅ Nmap integration with 4 scan modes
  • ✅ DNS lookup (forward and reverse)
  • ✅ Packet sniffing with TShark
  • ✅ Cross-platform support (Windows/Linux/macOS)
  • ✅ ANSI-colored terminal UI
  • ✅ Zero external Python dependencies

Made with ❤️ for the security community

⭐ Star this repo if you find it useful!

Report Bug · Request Feature

About

A lightweight, cross-platform CLI cybersecurity toolkit for network reconnaissance and security testing. Designed for penetration testers, security professionals, and network administrators.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages