Automated Network Scanning is a Python-based toolkit that streamlines common reconnaissance and scanning tasks.
It appears to include both passive and active recon modules, web-focused scanning, basic reporting, and some experimental automation/voice control utilities.
Note: This README is a starter template inferred from the current files in the repo.
You should update the sections (especially usage examples and dependencies) to match the actual behavior of your scripts.
-
Active Reconnaissance
- Script:
active_recon.py - Intended to perform direct, active scans against a target (e.g., ports, services, or hosts).
- Script:
-
Passive Reconnaissance
- Script:
passive_recon.py - Likely performs OSINT/passive data gathering without directly touching the target (e.g., subdomains, DNS, metadata).
- Script:
-
Web Scanning
- Script:
web_scanning.py - Focused on scanning web applications or domains (e.g., crawling, endpoint discovery, basic checks).
- Script:
-
Subdomain Enumeration
- Binary/tool:
subfinder - External subdomain discovery tool (likely required in PATH or run from this repo).
- Binary/tool:
-
Command Orchestration / Execution
- Scripts:
command.py,command_execution.py,command_executor.py,command_executor2.py - Helpers for running and managing shell commands or scan commands.
- Scripts:
-
Automation Scripts
- Scripts:
script2.py,script3.py,script4.py,script5.py,script6.py - Likely variants or experimental pipelines combining recon/scanning steps.
- Scripts:
-
Voice Control (Experimental)
- Script:
voice_recognition.py - Uses audio input (e.g.,
test.wav) to recognize commands and possibly trigger scans.
- Script:
-
Reporting
- Script:
report_generation.py - Output file:
report.txt - Generates and/or updates a text report based on scan results.
- Script:
-
Main Entrypoints
- Scripts:
main.py,main2.py - Likely orchestrate the overall flow (choosing recon type, starting scans, generating reports).
- Scripts:
main.py,main2.py– Main entrypoint scripts for running automated scans.active_recon.py– Active reconnaissance logic.passive_recon.py– Passive reconnaissance/OSINT logic.web_scanning.py– Web application / website scanning.report_generation.py– Handles generating reports, e.g.,report.txt.command.py,command_execution.py,command_executor.py,command_executor2.py– Command execution utilities.script2.py–script6.py– Additional/experimental automation scripts.voice_recognition.py– Voice-based command recognition.subfinder– Subdomain discovery binary/tool (external dependency).report.txt– Example scan report output.test.wav– Example audio input for voice recognition.IMG-20250317-WA0004.jpg– Image resource (possibly a diagram or illustration).venv/– Python virtual environment (local to your machine; usually not committed).__pycache__/– Python bytecode cache (auto-generated).
- Clone the repository
git clone https://github.com/harsh2025-sketch/Automated-Network-Scanning.git
cd Automated-Network-Scanning- Create and activate a virtual environment (recommended)
python -m venv venv
# Windows
venv\Scripts\activate
# Linux / macOS
source venv/bin/activate- Install dependencies
Create a requirements.txt (if not present) and add your libraries there (for example only):
requests
beautifulsoup4
python-nmap
speechrecognition
pyaudio
Then install:
pip install -r requirements.txt- Install / configure external tools
- Ensure
subfinder(or any other external binaries you use) are:- Present in this directory or
- Installed and available in your system
PATH.
Update this section with any other tools (e.g., nmap, ffmpeg, etc.) that your scripts call.
The commands below are examples. Update them according to how your scripts actually work.
python main.pyPossible behaviors:
- Ask for a target (IP/domain).
- Offer a choice between active, passive, or web scanning.
- Run the selected recon workflow and generate/update
report.txt.
If main2.py is your preferred or newer entrypoint, you can use:
python main2.pypython active_recon.py --target example.compython passive_recon.py --domain example.compython web_scanning.py --url https://example.comIf report_generation.py is standalone:
python report_generation.py --input scan_results.json --output report.txtAdjust arguments to match your implementation.
python voice_recognition.py --audio test.wavThis might:
- Listen for predefined phrases (e.g., “start active scan”, “run passive recon”).
- Trigger corresponding scripts.
If you use configuration files (YAML/JSON/ENV), document them here. For example:
- Environment variables (e.g., API keys, proxy settings).
- Default targets or wordlists.
- Paths to external tools like
subfinder,nmap, etc.
Example:
export SUBFINDER_PATH=/usr/local/bin/subfinder
export HTTP_PROXY=http://127.0.0.1:8080Typical outputs may include:
report.txt– Consolidated scan summary.- Additional log or result files (
*.txt,*.json, etc.), as defined by your scripts.
Explain:
- Where results are stored.
- What format they are in.
- How to interpret key sections of the report.
- Combine active, passive, and web scanning into a single unified workflow.
- Improve reporting (HTML/PDF reports, charts).
- Enhance voice recognition (real-time microphone input, better command set).
- Add configuration management (single
config.yamlfile).
This tool is intended only for educational and authorized security testing.
Do not use it against systems you do not own or have explicit permission to test.
The author is not responsible for any misuse or damage caused.
- GitHub: harsh2025-sketch
Feel free to open issues or suggestions (if the repository is made public and issues are enabled).