FreeNet is a powerful, all-in-one Python toolset designed to help you discover, scan, and test "bughosts" within Internet Service Providers. These hosts are often used for exploring free internet possibilities via SSH/VPN tunneling apps.
Here is a simple explanation of every tool and the terms you might see while using them:
- What it does: Searches for subdomains (hosts) related to a specific website.
- When to use: Start here! If you have a site like
example.com, use this to find all its hidden subdomains (e.g.,api.example.com,cdn.example.com). - Common Inputs:
- Target Site: The main domain you want to scan (e.g.,
vodafone.com.eg). - Subnet Mask: Defines how many IP addresses to scan around the target.
1(/24): Scans about 254 IPs (Fast).2(/16): Scans about 65,000 IPs (Slower, but finds much more).
- Target Site: The main domain you want to scan (e.g.,
- What it does: Checks if the hosts you found are alive and accepting connections.
- When to use: Use this after the "Host Finder" to filter out dead or unreachable hosts.
- Common Inputs:
- Input File: The text file containing the list of hosts (defaults to
BugHosts/All_Hosts.txt). - Ports: The "doors" to try and enter. Common web ports are
80(HTTP) and443(HTTPS). - Threads: Speed of the scan. Higher number = faster scan (but takes more CPU). Default is
100. - HTTP Method: The command sent to the server.
HEADis fast and light;GETretrieves the full page.
- Input File: The text file containing the list of hosts (defaults to
- What it does: Checks if a host supports SSL/TLS (encrypted connection) via SNI (Server Name Indication).
- When to use: Essential for finding hosts that work with SSL/TLS Tunneling apps (like HA Tunnel Plus).
- Common Inputs:
- Subdomain Depth (Deep): How "deep" to look in the domain name for the SNI.
- Example: For
a.b.example.com, a depth of2extractsexample.com. A depth of3extractsb.example.com.
- Example: For
- Subdomain Depth (Deep): How "deep" to look in the domain name for the SNI.
- What it does: Looks for open proxies (servers that route your traffic).
- When to use: If you need a working proxy IP and Port for your VPN settings.
- Common Inputs:
- Target URL: A test site to verify if the proxy actually works (e.g.,
http://google.com). - Proxy Ports: The specific ports to check for proxies (e.g.,
8080,3128,80).
- Target URL: A test site to verify if the proxy actually works (e.g.,
- What it does: The advanced mode. It throws custom "Payloads" (special text strings) at the hosts to see if they bypass restrictions.
- When to use: If you have a
payloads.txtfile and want to test which host reacts to which payload. - Common Inputs:
- Payloads File: A text file containing the payloads you want to injection test.
-
Clone the repository:
git clone https://github.com/AhmadAllam/FreeNet.git cd FreeNet -
Install dependencies:
pip install aiohttp aiofiles asyncio-throttle
- Run the main script:
python main.py
- You will see the menu:
========================================== FreeNet Main Menu by AhmadOo ========================================== [1] Host Finder [2] Direct Scanner [3] SSL Scanner [4] Proxy Scanner [5] Payload Tester [6] Exit - Type the number of the tool you want.
- Answer the questions (or just press Enter to use the smart defaults!).
- Dev. AhmadAllam
- Telegram: @echo_tester
- #unlimited_internet_in_egypt
- Don't forget Palestine β€οΈ