Skip to main content

Pytheas22 is a Port Scanner which scans IP-Cameras, internal networks, individual hosts and arp spoofing. If the port 22 is open it will try to login to that host via bruteforce

Project description

Pytheas22

image

Created by: Fawaz Bashiru

Pytheas22 is an innovative Port Scanner. It scans IP-Cameras of countries, your home network and individual IP-Addresses or websites. Analysis of the IP-Cameras and the scanned home network will be saved in a database. Every open port will have a documentation.

If the port 22 of an IP-Address or a website is open pytheas22 will try to log in to the host via bruteforce.

Check out my github: https://github.com/Kill0geR/Pytheas22

Making a range of ports

from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()

This makes a list of every well_known ports Output of that list will look like this:

[20, 21, 22, 23, 25, 53, 80, 110, 119, 123, 135, 139, 143, 161, 194, 389, 443, 445, 515, 520, 636, 3389, 5060, 5061, 5357, 8001, 8002, 8080, 9080, 9999, 62078]

If you want to make your own list simply do this:

from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(port_range="20-80")
scanner_lst = scanner.make_lst()

This will make a list from 20 to 80 Output of that list will look like this:

[20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80]

Scanning with Pytheas22

After you made your list you have to choose what you want to scan

  • To scan your home network:
from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()

start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_internal_network()
  • To scan ip cameras:
from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()

start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_ip_cameras()
  • To scan one host:
from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()

start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst)
start_scan.scan_one_addr("127.0.0.1") #websites also work like start_scan.scan_one_addr("https://google.com")
  • All included:
from Pytheas22 import Port_Scanner

ask_port_scanner = Port_Scanner.PortScanner()
ask_port_scanner.question()

This will have every scanning opportunity. Every step will be questioned like in the picture. Just like the GitHub version

Bruteforcing hosts with open ssh ports

To Bruteforce hosts with open ssh ports simply set the parameter 'ssh_bruteforce' from PythonPortScanner to True:

from Pytheas22 import Python_Port_Scanner

scanner = Python_Port_Scanner.PythonPortScannerList(well_known_ports=True)
scanner_lst = scanner.make_lst()

start_scan = Python_Port_Scanner.PythonPortScanner(scanner_lst, ssh_bruteforce=True)
start_scan.internal_network()

The wordlist for that bruteforce is on my GitHub: https://github.com/Kill0geR/Pytheas22

Arp Spoofing targets from your network

from Pytheas22 import Python_Port_Scanner

arp_spoof = Python_Port_Scanner.ArpSpoofing()
arp_spoof.spoof_network()

Follow the instructions to know what to do (WORKS ONLY ON LINUX!!!!)

Additional

  • Works on Linux and Windows (recommended in Linux). Arp Poisoning works only on linux

  • Pytheas22 is very easy to use.

  • Port scanning on IPv6 is also possible

  • Bruteforce list is trained on ip-cameras

  • DO NOT USE THIS TO ATTACK SOMEONE FOREIGN. I BUILD IT FOR EDUCATIONAL PURPOSES.

Change Log

0.0.1 (01/06/2023)

  • First Release

0.0.2 (05/06/2023)

  • New Internal database
  • Files on GitHub now work on windows
  • "question" function now also works on windows

0.0.2.1 (10/06/2023)

  • (small fixes)

0.0.3 (28/07/2023)

  • prints hostnames of internal network
  • new printing system
  • more efficient port information

0.0.4 (01/08/2023)

  • 15x faster port scanning

0.0.5 (10/09/2023)

  • Better Code
  • New Arp Poisoning Feature (only on Linux)
  • Better Port scanning on Windows
  • Shows Seconds over run seconds when scanning lots of ip's
  • Multithreading Error fixed

0.0.6 (17/09/2023)

  • New Printing Modell
  • New Python_Port_Scanner.py Script

0.0.7 (12/12/2023)

  • IPv6 port scanning
  • new terminal look
  • Getting the exact location of the target's IP

0.0.7.1 (15/12/2023)

  • Download fix

0.0.7.2 (15/12/2023)

  • Error fix

0.0.8 (16/12/2023)

  • New Portscanning Model in Linux
  • New Hostname features in Linux
  • Port scanning error fixed in Linux

0.0.9 (18/12/2023)

  • Network scan fix

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

Pytheas22-0.0.9.tar.gz (18.6 kB view hashes)

Uploaded Source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page