Pydrommer is an simple asynchronous Internet-scale port scanner that uses asyncio. It's flexible, allowing arbitrary port, address ranges and other. There is also a module for receiving HTTP headers and detection jsonrpc.
- ports_scanner : Discovers open ports
- http_headers_getter : Gets HTTP headers or only discovers JSON RPC
Donate me if you like it:
bitcoin -> bc1qqkr72aemz59aawxf74gytrwuw4m9mj20t7e7df
ethereum -> 0xB3e5b643cFB9e2565a3456eC7c7A73491A32e31F
The following actions were performed on ubuntu 19.04 with python3.7
git clone https://github.com/mkbeh/pydrommer
cd pydrommer
python3.7 setup.py install --user
pydrommer
Note:
If error previously add clonned directory to PYTHONPATH.
List of supported input:
- hosts:
* file/file with URLS
* single IP
* subnet
* URL (only for http_headers_getter module)
-ports:
* range : 0-65535
* separated : 80,8080,27017
* combined : 80,1000-2000,8080,10500,12000-13000
* file : with single ports
* single port
---------------------------------------------------------------------------------------------------------
IMPORTANT NOTE:
For more accurate results, manipulate the options `hS` and `pS`.
In order to get HTTP headers or to detect a JSON-RPC for hosts from the final file that the pydrommer scanner
generates after scanning on open ports - use the following syntax:
Ex.: pydrommer http_headers_getter -iH ports_checker-final-24-05-19-21-34-03.prm -iP ports_checker-final-24-05-19-21-34-03.prm
- In the example above the same file is specified.
- *prm extension in file is required!
# Will show available modules
pydrommer
# Will show help message for module
pydrommer <module_name> --help
# Will scan current IP by range.
pydrommer ports_scanner -iH 192.0.2.1 -iP 1-65535
# Will parse HTTP headers for subnet by combined ports
pydrommer http_headers_getter -iH 192.0.2.1/30 -iP 1-1000,1253