Pytheas22 is a Port Scanner which scans IP-Cameras, internal networks and individual hosts. If the port 22 is open it will try to login to that host via bruteforce
Project description
Pytheas22
Created by: Fawaz Bashiru
Pytheas22 is an innovative Port Scanner. It scans IP-Cameras of countries, your home network and individual IP-Addresses or websites. Analysis of the IP-Cameras and the scanned home network will be saved in a database. Every open port will have a documentation.
If the port 22 of an IP-Address or a website is open pytheas22 will try to log in to the host via bruteforce.
Check out my github: https://github.com/Kill0geR/Pytheas22
Making a range of ports
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()
This makes a list of every well_known ports Output of that list will look like this:
[20, 21, 22, 23, 25, 53, 80, 110, 119, 123, 135, 139, 143, 161, 194, 389, 443, 445, 515, 520, 636, 3389, 5060, 5061, 5357, 8001, 8002, 8080, 9080, 9999, 62078]
If you want to make your own list simply do this:
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(port_range="20-80")
scanner_lst = scanner.make_lst()
This will make a list from 20 to 80 Output of that list will look like this:
[20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80]
Scanning with Pytheas22
After you made your list you have to choose what you want to scan
- To scan your home network:
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()
start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_internal_network()
- To scan ip cameras:
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()
start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_ip_cameras()
- To scan one host:
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()
start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_one_addr("127.0.0.1") #websites also work like start_scan.scan_one_addr("https://google.com")
- All included:
from Pytheas22 import Port_Scanner
Port_Scanner.PortScanner.question(Port_Scanner.PortScanner)
This will have every scanning opportunity. Every step will be questioned like in the picture. Just like the GitHub version
Bruteforcing hosts with open ssh ports
To Bruteforce hosts with open ssh ports simply set the parameter 'ssh_bruteforce' from PythonPortScanner to True:
from Pytheas22 import Python_Port_Scanner
scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()
start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst, ssh_bruteforce=True)
start_scan.internal_network()
The wordlist for that bruteforce is on my GitHub: https://github.com/Kill0geR/Pytheas22
Additional
-
Works on Linux and Windows (recommended in Linux)
-
Pytheas22 is very easy to use.
-
Bruteforce list is trained on ip-cameras
-
DO NOT USE THIS TO ATTACK SOMEONE FOREIGN. I BUILD IT FOR EDUCATIONAL PURPOSES.
Change Log
0.0.1 (01/06/2023)
- First Release
0.0.2 (05/06/2023)
- New Internal database
- Files on GitHub now work on windows
- "question" function now also works on windows
0.0.2.1 (10/06/2023)
- (small fixes)
0.0.3 (28/07/2023)
- prints hostnames of internal network
- new printing system
- more efficient port information
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.