A CLI wrapper for popular network security and pentesting tools — making
nmap,hping3, andpingeasy to use through an interactive prompt.
- Netsploit is an interactive CLI wrapper around tools like
nmap,hping3, andping. - Features are organised as modules — each module runs a specific network function and lets you configure it through prompts.
- After a module finishes, you can choose whether to save the output to a log file.
- You only need to run
netsploit.py— no need to touch the source code.
Note
This is a work-in-progress project. If you run into any bugs or unexpected behaviour, feel free to open an issue.
| # | Module | Description |
|---|---|---|
| 1 | network-scanner |
Find all devices connected to the local network |
| 2 | device-info |
Gather detailed information about a target device |
| 3 | os-guesser |
Guess the operating system running on a target device |
| 4 | port-scanner |
Scan a target device for open ports and services |
| 5 | vuln-scanner |
Scan a target for known vulnerabilities |
| 6 | oui-lookup |
Look up a device manufacturer by MAC OUI |
| 7 | ping |
Check if a target is reachable and measure latency |
| 8 | dos |
Run a Denial-of-Service attack on a target (Linux/macOS only) |
| Platform | Supported | Notes |
|---|---|---|
| Linux | ✅ Full support | All modules work |
| macOS | ✅ Full support | All modules work |
| Windows | DoS module unavailable (hping3 not on Windows) |
Modules that require elevated privileges (network scan, OS detection, device info) run with sudo automatically on Linux and macOS. On Windows, run your terminal as Administrator before launching Netsploit.
Make sure the following are installed on your system before running setup:
| Tool | Required for | Install |
|---|---|---|
| Python 3.8+ | Running Netsploit | python.org |
| nmap | All scan modules | apt install nmap / brew install nmap |
| hping3 | DoS module (Linux/macOS only) | apt install hping3 / brew install hping3 |
1. Clone the repository
git clone https://github.com/ArcticDev78/netsploit-py.git
cd netsploit-pyAlternatively, download the ZIP from
Code > Download ZIPon this page — but note that you won't be able to pull future updates that way.
2. Run the setup script
chmod +x setup.sh
./setup.shThe setup script will:
- Check for Python and system dependencies (
nmap,hping3) - Create and activate a Python virtual environment (
.venv) - Install all Python dependencies from
requirements.txt - Create the log directory structure
Activate the virtual environment and launch:
source .venv/bin/activate
python3 netsploit.pyOn macOS/Linux you can also just re-run
./setup.shany time — it's safe to run multiple times and won't recreate things that already exist.
Once inside the Netsploit prompt:
| Command | Description |
|---|---|
use <module> |
Load and run a module (e.g. use port-scanner) |
auto |
Automated mode — scan the network then run a chosen module on a target |
modules |
List all available modules |
shell |
Run an arbitrary shell command without leaving Netsploit |
help |
Show help information |
clear |
Clear the screen |
exit |
Exit Netsploit |
Example workflow:
netsploit > use network-scanner # find devices on the network
netsploit > use port-scanner # scan a specific target for open ports
netsploit > use vuln-scanner # check that target for vulnerabilities
Or use auto to do all of the above in a guided flow.
oui.txt(OUI Lookup Database) — sourced from the Wireshark project. Not created by or owned by this project.
