Network Exploration Tool is a Python-based utility that autonomously explores networks by combining passive and active reconnaissance techniques. It passively sniffs network traffic to gather information and actively probes the network using ARP, ICMP, and TCP SYN scans. Built on the Scapy library, it allows users to analyze protocols, discover devices and services, and perform security testing and research.
This tool includes the following scans for active discovery:
| Name | Description |
|---|---|
| ARP | This scan is used to identify MAC addresses of IPv4 hosts on the same network. |
| ICMP | This scan is used to identify IPv4 hosts on the same network and their status. |
| TCP-SYN | This scan is used to identify open ports on IPv4 and IPv6 hosts on the same network. |
The following list presents the protocols sniffed by this tool.
| Name | Description |
|---|---|
| Ethernet | |
| 802.3 | |
| VLAN | |
| ARP | |
| NDP | |
| IPv4 | |
| IPv6 | |
| ICMP | |
| ICMPv6 | |
| TCP | |
| UDP |