Skip to content

colsach/scapy-probe

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Network Exploration Tool

Network Exploration Tool is a Python-based utility that autonomously explores networks by combining passive and active reconnaissance techniques. It passively sniffs network traffic to gather information and actively probes the network using ARP, ICMP, and TCP SYN scans. Built on the Scapy library, it allows users to analyze protocols, discover devices and services, and perform security testing and research.

Active Probing

This tool includes the following scans for active discovery:

Name Description
ARP This scan is used to identify MAC addresses of IPv4 hosts on the same network.
ICMP This scan is used to identify IPv4 hosts on the same network and their status.
TCP-SYN This scan is used to identify open ports on IPv4 and IPv6 hosts on the same network.

Passive Probing

The following list presents the protocols sniffed by this tool.

Name Description
Ethernet
802.3
VLAN
ARP
NDP
IPv4
IPv6
ICMP
ICMPv6
TCP
UDP

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors