██████╗ ██████╗ ██████╗ ████████╗███████╗██████╗ ██╗██████╗ ███████╗██████╗ ██╔══██╗██╔═══██╗██╔══██╗╚══██╔══╝██╔════╝██╔══██╗██║██╔══██╗██╔════╝██╔══██╗ ██████╔╝██║ ██║██████╔╝ ██║ ███████╗██████╔╝██║██║ ██║█████╗ ██████╔╝ ██╔═══╝ ██║ ██║██╔══██╗ ██║ ╚════██║██╔═══╝ ██║██║ ██║██╔══╝ ██╔══██╗ ██║ ╚██████╔╝██║ ██║ ██║ ███████║██║ ██║██████╔╝███████╗██║ ██║ ╚═╝ ╚═════╝ ╚═╝ ╚═╝ ╚═╝ ╚══════╝╚═╝ ╚═╝╚═════╝ ╚══════╝╚═╝ ╚═╝ v1.0 by David Schütz (@xdavidhu)
A lightning fast multithreaded network scanner framework with modules.
portSpider is a tool for scanning huge network ranges to find open ports and vulnerable services. This tool is not intended to scan one target, rather a whole IP range. (eg. 192.168.0.0/24) Most of the time companies/organizations have public information about their owned public IP ranges, so portSpider will help you to scan all of their machines at once for vulnerable devices/services.
- http - Scan for open HTTP ports, and get the titles.
- mysql - Scan for open MySQL servers, and try to log in with the default credentials.
- mongodb - Scan for open MongoDB instances, and check if they are password protected.
- ssh - Scan for open SSH ports.
- printer - Scan for open printer ports and websites.
- gameserver - Scan for open game server ports.
- manual - Scan custom ports.
- modules - List all modules.
- use - Use a module.
- options - Show a module's options.
- set - Set an option.
- run - Run the selected module.
- back - Go back to menu.
- exit - Shut down portSpider.
Debian based systems:
$ sudo apt-get update && sudo apt-get install python3 python3-pip -y $ git clone https://github.com/xdavidhu/portSpider $ cd portSpider/ $ python3 -m pip install -r requirements.txt
macOS / OSX:
$ brew install python3 $ git clone https://github.com/xdavidhu/portSpider $ cd portSpider/ $ python3 -m pip install -r requirements.txt
NOTE: You need to have Homebrew installed before running the macOS/OSX installation.
WARNING: portSpider is only compatible with Python 3.3 & 3.4 & 3.5 & 3.6
Start portSpider with Python3:
Select a module: (eg. 'mysql')
portSpider $> use mysql
View the module's options:
portSpider/mysql $> options
Set all '[NOT SET]' options: (eg. option 'network' to '192.168.0.0/24')
portSpider/mysql $> set network 192.168.0.0/24
(You can also modify already set options, but that is not required.)
If you have every option set, run the scan:
portSpider/mysql $> run
You will see the results on the screen as well as in a text file in the 'logs/' folder.
If you have any ideas about new modules and improvements in portSpider, feel free to contribute.
- Check out the
templatemodule to get a better understanding of the framework.
- Make sure to include a description about your module in the pull request.
- If you create a module, you will be mentioned here in the readme with a link to your social media.
I'm not responsible for anything you do with this program, so please only use it for good and educational purposes.
Copyright (c) 2017 by David Schütz. Some rights reserved.