NetTools is a modular, hybrid (Python + Rust) cyber warfare suite developed for cybersecurity experts, penetration testers, and researchers.
It unifies all strategic attack vectors, from Reconnaissance to Post-Exploitation, under a single powerful CLI tool.
This tool combines the flexibility of Python with the raw performance of Rust.
- NetScan: Discovers devices on the network (ARP Scanner).
- PortScan: Identifies open ports and services on the target.
- DirScan: Discovers hidden directories and files on web servers (Multi-threaded).
- DNS Enum: Collects subdomains and DNS records.
- MITM: Intercepts network traffic via ARP Spoofing (Man-in-the-Middle).
- Packet Sniffer: Captures and analyzes network packets in real-time.
- DNS Spoofing: Redirects target traffic to fake IP addresses.
- DNS Proxy (Chef): Acts as a fake DNS server to manipulate queries.
- SYN Flood: Performs DoS (Denial of Service) attacks on target ports.
- SSH Brute Force: Performs dictionary attacks on SSH services.
- GenList: Generates high-speed wordlists with millions of combinations per second using the embedded Rust engine.
- Note: The tool automatically compiles and executes the Rust code seamlessly.
- Reporter: Exports all scan and attack results into a professional HTML report.
Ensure you have Python 3 and Rust (Cargo) installed.
- Clone the Repository:
git clone https://github.com/bellamy58/nettools.git cd nettools - Install Python Dependencies:
pip install -r requirements.txt
Using this tool on systems you do not own or have explicit permission to test is illegal. The developer (Bellamy) assumes no liability for misuse or damage caused by this tool.
👨💻 Developer Bellamy Cyber Security Researcher & Developer