A powerful, Python-based network vulnerability scanner featuring multi-threaded port scanning, smart CVE lookup, active credential auditing (SSH/MySQL), and zero-dependency HTML reporting.
A Full-Stack Network Vulnerability Scanner & Penetration Testing Tool NetSec Suite is a powerful, Python-based automated security auditing tool designed for system administrators and penetration testers. It goes beyond simple port scanning by integrating Active Service Detection, Smart CVE Lookup, and "Red Team" Credential Auditing into a single, user-friendly web dashboard. Built with Python (Flask) and Multi-threading, it delivers fast, accurate, and professional security reports without requiring complex external dependencies.
• Advanced Port Scanning & Fingerprinting
• Multi-Threaded Scanning: Scans thousands of ports in seconds using concurrent threads.
• Custom Ranges: User-definable Start/End ports (1–65535).
• Service Detection: Performs banner grabbing to identify running services (Apache, OpenSSH, MySQL, etc.) and their specific version numbers.
• OS Fingerprinting: TTL-based analysis to detect the target Operating System (Linux/Unix, Windows, Cisco/Network Devices).
• Context-Aware Lookup: Unlike basic scanners that guess, NetSec Suite queries the NVD (National Vulnerability Database) using the exact Service + Version tuple.
• Accurate Reporting: Filters out false positives (e.g., distinguishing between a safe MySQL 8.0 and a vulnerable MySQL 5.5).
• Severity Scoring: Automatically categorizes risks as Critical, High, Medium, or Low based on CVSS scores.
• SSH Audit: Uses paramiko to test open SSH ports against a dictionary of common weak credentials (root:root, admin:admin, etc.).
• Database Audit: Checks MySQL/MariaDB interfaces for weak or default root passwords.
• Web Vulnerability Check: Safely tests HTTP/HTTPS ports for basic SQL Injection vulnerability markers.
• Zero-Dependency HTML Reports: Generates a standalone, professionally styled HTML report.
• Executive Summary: Includes graphical severity breakdowns and "Critical Alert" warnings.
• Methodology Section: Appends a detailed explanation of testing methods (Audit criteria, CVE mapping) to help clients understand the findings.
Bash
git clone https://github.com/yourusername/Network-Security-Suite.git cd Network-Security-Suite
pip install flask requests paramiko mysql-connector-python
python3 Network_Security_Suite_V_10.1.py
1. Start the tool: python3 Network_Security_Suite_V_10.1.py
2. Open your browser and navigate to http://127.0.0.1:5000
3. Enter the Target IP, Port Range (e.g., 1-1000), and Threads (e.g., 100).
4. Toggle specific audit modules (SSH, MySQL, Web).
5. Click "Initiate Security Audit" and wait for the results.
6. Download the HTML Report upon completion.
This project is licensed under the MIT License - see the LICENSE file for details.
See ACKNOWLEDGEMENTS.md for credits and thanks.
For support, feedback, or collaboration:
- Sreekanthan K N
- Email: [email protected]
- LinkedIn: https://www.linkedin.com/in/sreekanthan-k-n-79763623
- GitHub: https://github.com/sreekanthankn
Feel free to open an issue for bugs, improvements, or feature requests.
This tool is for educational and authorized testing purposes only. Scanning targets without prior mutual consent is illegal. The developer is not responsible for any misuse or damage caused by this program. Always obtain permission before scanning networks you do not own.