Skip to main content

Professional Network Administration and Security Toolkit

Project description

XNET – Professional Network Administration & Security Toolkit

GitHub Release Python License

XNET is a comprehensive, extensible CLI suite for network diagnostics, security auditing, traffic analysis, and administration. Designed for system administrators, DevOps, security professionals, and network engineers.


🚀 Quick Start

  1. Clone repository

    git clone https://github.com/StasX-Official/xnet.git
    cd xnet
    
  2. (Optional) Create a Python virtual environment

    python3 -m venv venv
    source venv/bin/activate    # Linux / macOS
    venv\Scripts\activate.bat   # Windows
    
  3. Install dependencies

    pip install -r requirements.txt
    pip install cryptography requests dnspython scapy netifaces python-iptables graphviz weasyprint
    
  4. Install XNET CLI

    pip install .
    
  5. Verify installation

    xnet --help
    

🔧 Features

Core Network Tools

  • ping – Host reachability
  • traceroute – Path discovery
  • latency – Average round-trip time
  • ipsweep – Ping sweep IP ranges
  • netmap – ARP-based network mapping

Port & Service Scanning

  • portscan – TCP port scan (async, rate-limited)
  • multiscan – Multi-host port scan via CSV or CIDR
  • lanscan – ARP scan for LAN hosts
  • serviceenum – Banner grabbing on multiple ports
  • dnsscan – Enumerate DNS record types

Traffic Analysis & Monitoring

  • sniff – Live packet capture (Scapy)
  • arpwatch – Detect ARP spoofing
  • netflow – UDP NetFlow/sFlow listener
  • dashboard – Quick summary of devices & ports

Security & Audit

  • cvescan – Query NVD for CVEs on open ports
  • sslscan – TLS version, cipher suite & certificate PEM
  • sslcert – X.509 certificate details
  • sslinfo – Fingerprint, issuer, validity & public key info

HTTP & API

  • httpget – HTTP(S) GET with header/body preview
  • apirequest – Generic REST client with JSON payload

Packet & Firewall Management

  • packet – Craft & send custom TCP/UDP/ICMP packets
  • knock – Port knocking listener & sender
  • serve – Simple HTTP fileserver

Configuration & Extensibility

  • cfg – Show, get or set values in config.json
  • cfgdrift – Monitor or check config file drift
  • report – Generate HTML or PDF report from logs
  • plugin – List, install or run external plugins

📖 Command Reference

# Diagnose connectivity
xnet ping <host>
xnet traceroute <host>
xnet latency <host> [count]

# Port scans
xnet portscan <host> [start] [end]
xnet multiscan <hosts> [ports]

# LAN and DNS
xnet lanscan [network/CIDR]
xnet dnsscan <domain>
xnet lookup <hostname>

# Packet capture & ARP monitoring
xnet sniff [iface] [filter] [count]
xnet arpwatch [iface] [duration]

# Security checks
xnet cvescan <host> [start] [end]
xnet sslscan <host> [port]
xnet sslcert <host> [port]
xnet sslinfo <host> [port]

# HTTP & API
xnet httpget <url>
xnet apirequest <METHOD> <url> [json_data]

# Custom packets & firewall
xnet packet <tcp|udp|icmp> <target> [port] [flags] [payload]
xnet knock <start|list|send> [sequence]
xnet serve <dir> [host] [port]

# Configuration & Logs
xnet cfg show|get|set [key] [value]
xnet cfgdrift monitor|status
xnet report <html|pdf> [basename]
xnet log view|clear

# Plugin system
xnet plugin list|install|run [name] [args...]

# Help & interactive
xnet help
xnet interactive

💡 Examples

  • Scan localhost TCP ports 1–100
    xnet portscan 127.0.0.1 1 100

  • Sweep an IP range
    xnet ipsweep 192.168.1.1 192.168.1.254

  • Capture 500 packets on eth0
    xnet sniff eth0 "" 500

  • Detect ARP spoof attempts for 5 minutes
    xnet arpwatch eth0 300

  • Query HTTP headers and body
    xnet httpget https://example.com

  • Send custom TCP SYN to port 22
    xnet packet tcp 192.168.1.100 22 S "Hello"

  • Generate PDF report from logs
    xnet report pdf my-report


⚙️ Configuration

All settings stored in xnet_system/config.json:

{
  "version": "1.1.0",
  "max_ports": 500,
  "async_threads": 50,
  "security": { ... },
  "advanced_features": {
    "packet_sniffer": { "max_capture_time": 60, "max_packets": 1000 },
    "arp_watch":     { "monitoring_time": 300 },
    "port_knock":    { "sequences": { ... }, "open_port": 22 },
    "packet_sender": { "default_ttl": 64, "max_payload_size": 1024 }
  }
}

Use xnet cfg to view or update values without editing manually.


🧩 Plugins

  1. Place your plugin Python file under
    xnet_system/plugins/<name>.py

  2. Implement a main(*args) function.

  3. List available plugins:
    xnet plugin list

  4. Run a plugin:
    xnet plugin run <name> [args...]


🛠 Interactive Mode & Autocomplete

Enable shell completion in bash:

source bash_completion.sh

Start interactive session:

xnet interactive

Use Tab for commands and parameters, Ctrl+C to exit.


🆘 Troubleshooting & Support

  • Check logs at ~/.xnet/logs/xnet.log
  • Common issues: missing privileges, firewall blocking, module imports

Email: xnet@sxservisecli.tech
GitHub Issues: https://github.com/StasX-Official/xnet/issues


📜 License

This project is released under the MIT License.
© 2025 StasX (Kozosvyst Stas). All rights reserved.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

xnet_toolkit-1.1.0.tar.gz (32.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

xnet_toolkit-1.1.0-py3-none-any.whl (31.7 kB view details)

Uploaded Python 3

File details

Details for the file xnet_toolkit-1.1.0.tar.gz.

File metadata

  • Download URL: xnet_toolkit-1.1.0.tar.gz
  • Upload date:
  • Size: 32.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.4

File hashes

Hashes for xnet_toolkit-1.1.0.tar.gz
Algorithm Hash digest
SHA256 6acd19fa60b95e87751e6f28a2693933102906ba77f30f258518d61635e6e6de
MD5 8f6200fa89132fcf1d4aea678c4ef3cb
BLAKE2b-256 d43f0e410e21406903bdf6ede798b7b6198a2ff9d12c68690c64f20b761e4103

See more details on using hashes here.

File details

Details for the file xnet_toolkit-1.1.0-py3-none-any.whl.

File metadata

  • Download URL: xnet_toolkit-1.1.0-py3-none-any.whl
  • Upload date:
  • Size: 31.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.4

File hashes

Hashes for xnet_toolkit-1.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 642ca84100e179cf35a0302e0d39795b260a33d9385a6e42323b2b8a1e8be27f
MD5 0d6f484dd5d8b4e32bbfb38fc5211d19
BLAKE2b-256 ff5117ffdaf3022079b17045879dbaa78dc1bfc8998a8b3cf45a9401702495df

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page