You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[tags]scanner,shodan,nmap,portsecurity[/tags]
[short_descr]NetworkSherlock: Porwerfull Port Scanning With Shodan.[/short_descr]
[link]https://github.com/HalilDeniz/NetworkSherlock[/link]
[long_descr]NetworkSherlock is a powerful and flexible port scanning tool designed for network security professionals and penetration testers. With its advanced capabilities, NetworkSherlock can efficiently scan IP ranges, CIDR blocks, and multiple targets. It stands out with its detailed banner grabbing capabilities across various protocols and integration with Shodan, the world's premier service for scanning and analyzing internet-connected devices. This Shodan integration enables NetworkSherlock to provide enhanced scanning capabilities, giving users deeper insights into network vulnerabilities and potential threats. By combining local port scanning with Shodan's extensive database, NetworkSherlock offers a comprehensive tool for identifying and analyzing network security issues.[/long_descr]
Features
Scans multiple IPs, IP ranges, and CIDR blocks.
Supports port scanning over TCP and UDP protocols.
Detailed banner grabbing feature.
Ping check for identifying reachable targets.
Multi-threading support for fast scanning operations.
Option to save scan results to a file.
Provides detailed version information.
Colorful console output for better readability.
Shodan integration for enhanced scanning capabilities.
python3 networksherlock.py --help
usage: networksherlock.py [-h] [-p PORTS] [-t THREADS] [-P {tcp,udp}] [-V] [-s SAVE_RESULTS] [-c] target
NetworkSherlock: Port Scan Tool
positional arguments:
target Target IP address(es), range, or CIDR (e.g., 192.168.1.1, 192.168.1.1-192.168.1.5,
192.168.1.0/24)
options:
-h, --help show this help message and exit
-p PORTS, --ports PORTS
Ports to scan (e.g. 1-1024, 21,22,80, or 80)
-t THREADS, --threads THREADS
Number of threads to use
-P {tcp,udp}, --protocol {tcp,udp}
Protocol to use for scanning
-V, --version-info Used to get version information
-s SAVE_RESULTS, --save-results SAVE_RESULTS
File to save scan results
-c, --ping-check Perform ping check before scanning
--use-shodan Enable Shodan integration for additional information
The text was updated successfully, but these errors were encountered:
[tags]scanner,shodan,nmap,portsecurity[/tags]
[short_descr]NetworkSherlock: Porwerfull Port Scanning With Shodan.[/short_descr]
[link]https://github.com/HalilDeniz/NetworkSherlock[/link]
[long_descr]NetworkSherlock is a powerful and flexible port scanning tool designed for network security professionals and penetration testers. With its advanced capabilities, NetworkSherlock can efficiently scan IP ranges, CIDR blocks, and multiple targets. It stands out with its detailed banner grabbing capabilities across various protocols and integration with Shodan, the world's premier service for scanning and analyzing internet-connected devices. This Shodan integration enables NetworkSherlock to provide enhanced scanning capabilities, giving users deeper insights into network vulnerabilities and potential threats. By combining local port scanning with Shodan's extensive database, NetworkSherlock offers a comprehensive tool for identifying and analyzing network security issues.[/long_descr]
Features
[image]https://github.com/HalilDeniz/NetworkSherlock/raw/main/img/NetworkSherlock1.png[/image]
Usage
The text was updated successfully, but these errors were encountered: