Skip to content

CyLock11/Armap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

🗺️ ArMap - Network Discovery Tool

Python Version License Platform

🔍 A powerful and elegant network discovery tool that uses ARP protocol to identify active hosts on your network.

✨ Features

  • 🚀 Fast Network Scanning: Efficiently discovers active hosts using ARP protocol
  • 🎨 Colorized Output: Beautiful colored terminal output for better readability
  • 🏷️ Vendor Detection: Automatically identifies device manufacturers from MAC addresses
  • 📊 Network Statistics: Provides detailed network information and scan timing
  • 🛡️ Error Handling: Robust error handling with informative messages
  • 💻 Cross-Platform: Works on Linux, macOS, and Windows

📋 Requirements

  • 🐍 Python 3.6 or higher
  • 🔧 Administrator/root privileges (required for network scanning)
  • 🌐 Network interface access

🚀 Installation

  1. Clone the repository:

    git clone https://github.com/CyLock11/Armap.git
    cd ArMap
  2. Install dependencies:

    pip install -r requirements.txt
  3. Make it executable (Linux/macOS):

    chmod +x armap.py

🎯 Usage

Basic Usage

python armap.py -i <interface_name>

Examples

Linux/macOS:

sudo python armap.py -i eth0
sudo python armap.py -i wlan0

Windows:

python armap.py -i "Wi-Fi"
python armap.py -i "Ethernet"

📱 Sample Output

Interface: eth0, MAC: 00:11:22:33:44:55, IPv4: 192.168.1.100
Starting armap 1.0 with 254 hosts (https://github.com/CyLock11/Armap)

192.168.1.1     aa:bb:cc:dd:ee:ff       Cisco Systems
192.168.1.10    11:22:33:44:55:66       Apple Inc.
192.168.1.25    77:88:99:aa:bb:cc       Samsung Electronics
192.168.1.50    dd:ee:ff:00:11:22       Intel Corporate

Ending armap 1.0: 254 hosts scanned in 2.34 seconds

🔧 Command Line Options

Option Description Required
-i, --interface Network interface to scan ✅ Yes
-h, --help Show help message ❌ No

🛠️ How It Works

  1. Interface Validation: Verifies the specified network interface exists
  2. Network Discovery: Gathers network information (IP, MAC, subnet)
  3. ARP Scanning: Sends ARP requests to all hosts in the network range
  4. Vendor Lookup: Identifies device manufacturers using MAC address OUI
  5. Results Display: Shows discovered hosts with colored, formatted output

🐛 Troubleshooting

Common Issues

Permission Denied:

# Run with elevated privileges
sudo python armap.py -i eth0  # Linux/macOS

Interface Not Found:

# List available interfaces first
ip link show  # Linux
ifconfig      # macOS
ipconfig      # Windows

No Hosts Found:

  • Ensure you're connected to the network
  • Check if the interface has an IP address
  • Verify network connectivity

🤝 Contributing

Contributions are welcome! Please feel free to submit a Pull Request. For major changes, please open an issue first to discuss what you would like to change.

  1. 🍴 Fork the repository
  2. 🌟 Create your feature branch (git checkout -b feature/AmazingFeature)
  3. 💾 Commit your changes (git commit -m 'Add some AmazingFeature')
  4. 📤 Push to the branch (git push origin feature/AmazingFeature)
  5. 🔀 Open a Pull Request

📝 License

This project is licensed under the MIT License - see the LICENSE file for details.

👤 Author

CyLock11

⚠️ Disclaimer

This tool is intended for educational and authorized network testing purposes only. Always ensure you have proper authorization before scanning networks that don't belong to you.

🙏 Acknowledgments

  • 📦 Scapy - Powerful packet manipulation library
  • 🏷️ mac-vendor-lookup - MAC address vendor identification
  • 🎨 termcolor - Terminal color formatting

⭐ If you found this project helpful, please give it a star! ⭐

About

🗺️ Una herramienta elegante de descubrimiento de red que usa ARP para identificar hosts activos con salida colorizada y detección de fabricantes MAC.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages