NetworkVisor is a powerful and flexible network scanning tool designed to help users perform ARP scans, port scans, and ping sweeps to assess the status of devices and services on a network. This tool is designed for educational purposes and legitimate network security assessments with proper permissions.
- ARP Scan: Discover devices in the local network using ARP requests and retrieve their IP and MAC addresses.
- Port Scan: Perform TCP and UDP port scans to identify open ports and services running on remote systems.
- Ping Sweep: Perform a ping sweep to check which hosts are live on the network.
By using this tool, you agree that you are solely responsible for the actions performed with it. This tool is intended solely for educational purposes and legitimate network security assessments within the bounds of applicable laws and regulations.
You must ensure that you have explicit permission from the network owner before scanning any network or system. Unauthorized scanning or network probing may be illegal in some countries and could result in legal consequences.
The creators and contributors of this project assume no responsibility for any misuse or damages resulting from the use of this tool.
Make sure you have Python 3.6 or higher installed. Additionally, you will need to install the requirements file.
To set up the project in a virtual environment, follow these steps:
- Create a virtual environment:
python3 -m venv .venv
- Activate the virtual environment:
- On macOS/Linux:
source .venv/bin/activate
- On Windows:
.venv\Scripts\activate
- Install the required dependencies:
pip install -r requirements.txt
To run NetworkVisor, use the following command structure:
python scripts/scanner.py -i <TARGET_IP> -t <SCAN_TYPE> [-p <PORTS>]
- -i <TARGET_IP>: The target IP or IP range for the scan (e.g., 192.168.1.1/24).
- -t <SCAN_TYPE>: The type of scan to perform (arp, ping, or port).
- -p : A comma-separated list of ports (only for port scan). For example, 80,443,22.
- Perform ARP scan:
python scripts/scanner.py -i 192.168.1.1/24 -t arp
- Perform Ping sweep:
python scripts/scanner.py -i 192.168.1.1/24 -t ping
- Perform TCP port scan:
python scripts/scanner.py -i 192.168.1.1 -t port -p 80,443,22
We welcome contributions to NetworkVisor! If you have an idea for an improvement or have found a bug, feel free to fork the repository, create a branch, and submit a pull request.
- Fork the repository.
- Create a new branch for your feature or fix.
- Make your changes.
- Write tests to verify your changes (if applicable).
- Submit a pull request with a detailed description of the changes.
This project is licensed under the MIT License - see the LICENSE file for details.
- This project utilizes the Scapy library for network packet crafting and sniffing.
- Thanks to the open-source community for their contributions to network security tools.