- Overview
- Install & Prep
- First Run
- Install the Arsenal
- Common Workflows
- Sessions, Config, Logs
- Exporting Results
- Safety Tips
NETREAPER is a unified offensive toolkit with 70+ tools behind one interface. Use it to scan, attack, monitor, and report without juggling individual commands.
What’s new in v5.0 (Phantom Protocol): guided scan/WiFi wizards, first-run setup, log levels with audit trails, safer confirmations, and a refreshed status/installer experience.
- Levels: DEBUG, INFO, WARN, ERROR, FATAL (set via
NETREAPER_LOG_LEVELor config). - Audit trail:
~/.netreaper/logs/audit_*.logrecords installs/runs. - Verbose mode:
-v/--verboseor configVERBOSE=true.
- File:
~/.netreaper/config(auto-created on first run). - Edit interactively:
netreaper config edit. - Show:
netreaper config show; reset:netreaper config reset.
- First run wizard handles legal notice, verbose preference, and optional essentials install.
- Scan wizard:
netreaper wizard scan(target selection, scan type, timing, output). - WiFi wizard:
netreaper wizard wifi(interface selection, attack type, confirmation).
- Many WiFi/packet actions need root. The tool prompts with sudo and checks capability.
require_rootprompts,run_privilegedwraps commands with sudo when available.
netreaper scan 192.168.1.0/24 --fullnetreaper wizard scannetreaper wifi --monitor wlan0netreaper status --jsonnetreaper config show
- Clone:
git clone https://github.com/Nerds489/NETREAPER.git && cd NETREAPER. - Install:
sudo ./install.sh(addsnetreaperandnetreaper-installto PATH). - Verify basics:
netreaper --versionandnetreaper status. - Recommended packages (for full wireless/graphics support):
sudo apt install aircrack-ng wireshark hashcat hydraif your distro does not provide them via the installer.
netreaper- Accept the legal disclaimer on first launch.
- Navigate the main menu: Recon, Wireless, Exploit, Stress, Tools, Intel, Credentials, Post-Exploit.
- Use arrow keys/number input;
qorQexits.
Choose what to install before heavier tasks:
- Essentials (lean):
sudo netreaper-install essentials - Full arsenal:
sudo netreaper-install all - By category:
sudo netreaper-install recon,sudo netreaper-install wireless,sudo netreaper-install exploit,sudo netreaper-install creds - Check status anytime:
netreaper statusorsudo netreaper-install status
- Quick Recon of a subnet
netreaper scan 192.168.1.0/24 --quick
- Uses nmap quick profile. Add
--vulnfor vuln scripts or run from menu [1] Recon.
- Full Recon + Service/Vuln sweep
netreaper scan 10.0.0.5 --full --vuln
- Runs a comprehensive TCP scan with version detection and common NSE vulns.
- Wireless handshake capture and crack
netreaper wifi --monitor wlan0
netreaper crack handshake.cap --hashcat
- Monitor mode is started/stopped automatically; outputs go to
~/.netreaper/output/.
- Credential brute force (SSH/HTTP)
- Menu: Credentials -> Hydra/Medusa. Supply target, service, user/wordlists; NETREAPER builds the command and logs output.
- Stress/throughput test
- Menu: Stress -> iperf3 for bandwidth testing or HTTP Load for ab-based tests. Use the guided prompts for duration, streams, and concurrency.
- Session management
netreaper session start
netreaper session resume <name>
netreaper session export
- Sessions keep targets, outputs, and state across runs.
- Config:
~/.netreaper/config(edit vianetreaper config edit; view withnetreaper config show). - Sessions:
~/.netreaper/sessions/with per-session metadata. - Logs:
~/.netreaper/logs/(timestamped). Review after each run to see exact commands executed. - Loot/output:
~/.netreaper/loot/and~/.netreaper/output/for captures, creds, reports.
- Use
netreaper session export(or the menu export option) to bundle logs, outputs, and summaries. - Many modules drop Markdown/CSV/JSON next to their raw outputs for reporting.
- Run invasive modules (wireless attacks, brute force, stress) only with written authorization.
- Review the command previews shown before execution and read the corresponding log entries when testing new options.
- Keep tool versions updated:
sudo netreaper-install allto refresh, or update the script viawget .../netreaper -O netreaper && chmod +x netreaperif prompted. - Always verify interfaces:
ip link,rfkill listbefore enabling monitor mode.