············································
: _ _ _ ____ _ :
:| \ | | ___| |_/ ___| ___ ___ _ _| |_ :
:| \| |/ _ \ __\___ \ / __/ _ \| | | | __|:
:| |\ | __/ |_ ___) | (_| (_) | |_| | |_ :
:|_| \_|\___|\__|____/ \___\___/ \__,_|\__|:
············································
: By D3SH4N :
:..........................................:
NetScout is an Nmap automation tool designed to simplify the process of scanning IP addresses for open ports. This tool provides a command-line interface to perform different types of scans using the Nmap library in Python.
- Default TCP Scan: Performs a standard TCP scan to identify open ports.
- UDP Scan: Scans for open UDP ports.
- Full Scan: Performs a comprehensive scan that includes service detection, OS detection, and more.
- Python 3.x
- Nmap installed on your system.
- The
python-nmap
library.
Make sure to have nmap
installed on your system:
# For Ubuntu/Debian
sudo apt-get install nmap
# For CentOS/RHEL
sudo yum install nmap
#Install the python-nmap package:
pip install python-nmap
# 1. Clone the repository or download the script:
git clone https://github.com/yourusername/netscout.git
cd netscout
# 2. Run the script:
············································
: _ _ _ ____ _ :
:| \ | | ___| |_/ ___| ___ ___ _ _| |_ :
:| \| |/ _ \ __\___ \ / __/ _ \| | | | __|:
:| |\ | __/ |_ ___) | (_| (_) | |_| | |_ :
:|_| \_|\___|\__|____/ \___\___/ \__,_|\__|:
············································
: By D3SH4N :
:..........................................:
Please enter the type of scan you want to run
1)Default Scan
2)Default UDP Scan
3)Full Scan
Feel free to fork this repository and submit pull requests. For any issues, please open a ticket.
This project is licensed under the MIT License.
NetScout is intended for educational purposes only. Scanning a network without permission is illegal and unethical. Please use this tool responsibly.