███╗ ██╗███████╗ ██████╗ ███╗ ██╗███████╗████████╗
████╗ ██║██╔════╝██╔═══██╗████╗ ██║██╔════╝╚══██╔══╝
██╔██╗ ██║█████╗ ██║ ██║██╔██╗ ██║█████╗ ██║
██║╚██╗██║██╔══╝ ██║ ██║██║╚██╗██║██╔══╝ ██║
██║ ╚████║███████╗╚██████╔╝██║ ╚████║███████╗ ██║
╚═╝ ╚═══╝╚══════╝ ╚═════╝ ╚═╝ ╚═══╝╚══════╝ ╚═╝
Network Reconnaissance & Security Toolkit
A lightweight, cross-platform CLI cybersecurity toolkit for network reconnaissance and security testing. Designed for penetration testers, security professionals, and network administrators.
- 🔍 Nmap Scanner - Port scanning with multiple scan modes
- 🌐 DNS Lookup - Hostname to IP and reverse DNS resolution
- 📦 Packet Sniffer - Real-time network packet capture and analysis
- 🎨 Beautiful UI - ANSI-colored terminal interface
- 🖥️ Cross-Platform - Works on Windows, Linux, and macOS
- 🚀 Zero Dependencies - Pure Python 3 implementation
- Python 3.6 or higher
- Operating System: Windows 10+, Linux (any distro), macOS
- Nmap - For port scanning functionality
- TShark/Wireshark - For packet sniffing functionality
# Clone the repository
git clone https://github.com/Panda-0x01/neoNet.git
cd neonet
# Or download neonet.py directly
wget https://raw.githubusercontent.com/Panda-0x01/neonet/main/neonet.py# Install Nmap
sudo apt-get update
sudo apt-get install nmap
# Install TShark
sudo apt-get install tshark
# Allow non-root users to capture packets (optional)
sudo dpkg-reconfigure wireshark-common
sudo usermod -a -G wireshark $USER-
Install Nmap
- Download from: https://nmap.org/download.html
- Run installer and add to PATH
- Default path:
C:\Program Files (x86)\Nmap\
-
Install Wireshark (includes TShark)
- Download from: https://www.wireshark.org/download.html
- Run installer (select TShark component)
- Default path:
C:\Program Files\Wireshark\
# Using Homebrew
brew install nmap
brew install wireshark
# Or using MacPorts
sudo port install nmap
sudo port install wiresharkchmod +x neonet.py# Run normally
python3 neonet.py
# Run with sudo for packet capture
sudo python3 neonet.py
# Or if executable
./neonet.py
sudo ./neonet.py# Run normally
python neonet.py
# Run as Administrator (for packet capture)
# Right-click Command Prompt → "Run as Administrator"
python neonet.py[1] Nmap Scan - Port scanning & host discovery
[2] DNS Lookup - Resolve hostnames and IPs
[3] Packet Sniffing - Capture network packets
[4] About - Tool information & credits
[5] Exit - Close neoNet
Perform network port scans with multiple scanning modes:
- Quick Scan - Scans top 100 ports (fast)
- Standard Scan - Scans top 1000 ports (balanced)
- Aggressive Scan - OS and service detection (detailed)
- Full Port Scan - Scans all 65535 ports (thorough)
Example Usage:
Select: [1] Nmap Scan
Enter target: scanme.nmap.org
Select scan type: [2] Standard Scan
Resolve hostnames and perform reverse DNS lookups:
- Hostname to IP - Get IP address from domain name
- IP to Hostname - Get hostname from IP address
Example Usage:
Select: [2] DNS Lookup
Select lookup type: [1] Hostname to IP
Enter target: example.com
Result: IP Address: 93.184.216.34
Capture and analyze network packets in real-time:
- List available network interfaces
- Capture specific number of packets or continuous
- Display source/destination IPs and protocols
- Press Ctrl+C to stop capture
Example Usage:
Select: [3] Packet Sniffing
Enter interface number: 1
Number of packets: 100
(Shows live packet capture)
███╗ ██╗███████╗ ██████╗ ███╗ ██╗███████╗████████╗
████╗ ██║██╔════╝██╔═══██╗████╗ ██║██╔════╝╚══██╔══╝
██╔██╗ ██║█████╗ ██║ ██║██╔██╗ ██║█████╗ ██║
██║╚██╗██║██╔══╝ ██║ ██║██║╚██╗██║██╔══╝ ██║
██║ ╚████║███████╗╚██████╔╝██║ ╚████║███████╗ ██║
╚═╝ ╚═══╝╚══════╝ ╚═════╝ ╚═╝ ╚═══╝╚══════╝ ╚═╝
┌─────────────────────────────────────────────────────┐
│ Network Reconnaissance & Security Toolkit │
└─────────────────────────────────────────────────────┘
If tools are installed in non-standard locations, the script will automatically check:
Windows Default Paths:
- Nmap:
C:\Program Files (x86)\Nmap\nmap.exe - TShark:
C:\Program Files\Wireshark\tshark.exe
Linux/Mac:
- Uses
whichcommand to find tools in PATH
This tool is for AUTHORIZED security testing ONLY.
- ✅ Use only on networks and systems you own or have explicit permission to test
- ✅ Obtain written authorization before performing security assessments
- ✅ Comply with all applicable laws and regulations
- ❌ Unauthorized access to computer systems is ILLEGAL
- ❌ Port scanning without permission may violate laws
By using this tool, you agree to:
- Use it responsibly and ethically
- Accept full responsibility for your actions
- Comply with all local, state, and federal laws
- Get Permission - Always obtain written authorization
- Stay in Scope - Only test authorized targets
- Document Everything - Keep records of your activities
- Report Findings - Disclose vulnerabilities responsibly
- Protect Data - Handle sensitive information securely
- Linux: Run
sudo apt-get install nmap - Windows: Download from https://nmap.org/download.html
- Check PATH: Ensure nmap is in your system PATH
- Linux: Run
sudo apt-get install tshark - Windows: Install Wireshark from https://www.wireshark.org/download.html
- Linux: Run with
sudo python3 neonet.py - Windows: Run Command Prompt as Administrator
- Linux Alternative: Add user to wireshark group
- Use Windows 10 or later
- Use PowerShell or Windows Terminal (recommended)
- Update to latest Windows version
- Make sure Python 3 is installed
- Check that Nmap/TShark are properly installed
- Try adding tools to system PATH
If you encounter issues:
- Check the Issues page
- Search for similar problems
- Create a new issue with:
- Your OS and version
- Python version (
python --version) - Error message (full text)
- Steps to reproduce
Contributions are welcome! Here's how you can help:
- Fork the repository
- Create a feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
git clone https://github.com/Panda-0x01/neoNet.git
cd neonet
# Make your changes
python3 neonet.py # Test your changesThis project is licensed under the MIT License - see the LICENSE file for details.
- Nmap - The Network Mapper (https://nmap.org)
- Wireshark - Network Protocol Analyzer (https://www.wireshark.org)
- Python community for excellent documentation
- Security researchers and ethical hackers worldwide
- Metasploit - Penetration testing framework
- Burp Suite - Web application security testing
- Nikto - Web server scanner
- Netcat - Network utility tool
- Save scan results to file (JSON/CSV/HTML)
- Vulnerability scanning integration
- Network mapping visualization
- Multi-threaded scanning
- Custom Nmap script support
- Packet filtering options
- Historical scan comparison
- Config file support
- Plugin system
- ✅ Initial release
- ✅ Nmap integration with 4 scan modes
- ✅ DNS lookup (forward and reverse)
- ✅ Packet sniffing with TShark
- ✅ Cross-platform support (Windows/Linux/macOS)
- ✅ ANSI-colored terminal UI
- ✅ Zero external Python dependencies
Made with ❤️ for the security community
⭐ Star this repo if you find it useful!