mirror of
https://github.com/reiyua/Gelos80Sniff.git
synced 2026-01-20 08:17:47 +00:00
Update README.md to clairfy how the script works
This commit is contained in:
parent
43ec08f345
commit
aab4701ff2
1 changed files with 41 additions and 1 deletions
42
README.md
42
README.md
|
|
@ -1,2 +1,42 @@
|
|||
# Gelos80Sniff
|
||||
Coding project I had to make as part of my Cert IV Cybersecurity at TAFE NSW.
|
||||
Gelos80Sniff is a Python tool designed for network scanning and web enumeration. It identifies devices with open ports in a given IP range and performs directory discovery on web servers (port 80) using Gobuster.
|
||||
|
||||
This program was developed to run on Kali Linux, but should work fine on any other debian based distribution. Windows support is limited.
|
||||
|
||||
Features
|
||||
IP Range Validation: Checks the connectivity of the target IP range.
|
||||
|
||||
Port Scanning: Scans TCP ports (1-1024) and lists open ports.
|
||||
|
||||
Web Enumeration: Runs Gobuster to find hidden directories on port 80.
|
||||
|
||||
Export Results: Option to save Gobuster output to a TXT file.
|
||||
|
||||
Requirements
|
||||
Python 3.x
|
||||
|
||||
nmap Python library – Install with:
|
||||
pip install python-nmap
|
||||
|
||||
Gobuster – Make sure it is installed (e.g., on Linux: sudo apt-get install gobuster).
|
||||
|
||||
How to Use
|
||||
Clone the repository:
|
||||
git clone https://github.com/reiyua/Gelos80Sniff.git
|
||||
|
||||
Run the script with administrator privileges:
|
||||
sudo python3 Gelos80Sniff.py
|
||||
|
||||
Follow the prompts:
|
||||
|
||||
Enter an IP range (e.g., 192.168.1.0/24).
|
||||
|
||||
Specify your Gobuster wordlist path (e.g., /usr/share/wordlists/common.txt).
|
||||
|
||||
Optionally save the Gobuster results to a specific directory.
|
||||
|
||||
Example Paths
|
||||
Gobuster wordlist example: /usr/share/wordlists/common.txt
|
||||
|
||||
Disclaimer
|
||||
This tool is intended for educational purposes and authorized network testing only. Unauthorized use may violate legal and ethical standards. Always get permission before scanning any network.
|
||||
|
|
|
|||
Loading…
Reference in a new issue