GitHunt
HA

HacktiveMindset/Mini-Network-Scanner-Mini-Nmap-

A Python-based Network Reconnaissance Tool that performs host discovery, port scanning, and service/banner detection --- inspired by real-world penetration testing workflows.

๐ŸŒ Mini Network Scanner (Mini Nmap)

A Python-based Network Reconnaissance Tool that performs host
discovery, port scanning, and service/banner detection --- inspired by
real-world penetration testing workflows.

This project demonstrates how cybersecurity professionals enumerate
network targets during the reconnaissance phase.

โš ๏ธ Built for educational and ethical security testing only.


๐Ÿš€ Features

โœ… Host Discovery (Check if target is alive)
โœ… TCP Port Scanning (1--1024 ports)
โœ… Service / Banner Detection
โœ… Automated Recon Output
โœ… Beginner-Friendly Security Automation


๐Ÿง  Project Objective

This project helps understand:

  • Network Reconnaissance Techniques
  • Port Scanning Fundamentals
  • Service Enumeration
  • Penetration Testing Workflow
  • Python Automation for Security

๐Ÿ—๏ธ Project Structure

network_scanner/
โ”‚
โ”œโ”€โ”€ scanner.py           # Main execution file
โ”œโ”€โ”€ host_discovery.py    # Host availability check
โ”œโ”€โ”€ port_scanner.py      # Port scanning logic
โ”œโ”€โ”€ banner_grabber.py    # Service detection
โ””โ”€โ”€ requirements.txt

โš™๏ธ Installation

1๏ธโƒฃ Clone Repository

git clone https://github.com/HacktiveMindset/Mini-Network-Scanner-Mini-Nmap-.git
cd Mini-Network-Scanner-Mini-Nmap-

2๏ธโƒฃ Install Dependencies

pip install -r requirements.txt

โ–ถ๏ธ Usage

Run the scanner:

python scanner.py

Enter target:

scanme.nmap.org

๐Ÿ“Š Example Output

=== Mini Network Scanner ===

[+] Checking if host is alive...
[ALIVE] Host reachable

[+] Scanning ports...
[OPEN] Port 22
[OPEN] Port 80

===== SERVICE DETECTION =====
Port 22: OpenSSH
Port 80: Apache HTTP Server

===== SCAN COMPLETE =====

๐Ÿ” How It Works

1. Host Discovery

Checks DNS resolution to confirm the host is reachable.

2. Port Scanning

Uses Python sockets to test TCP connections across common ports.

3. Banner Grabbing

Attempts to retrieve service banners to identify running services.


๐Ÿ›ก๏ธ Security Concepts Covered

  • Network Enumeration
  • Attack Surface Discovery
  • Service Fingerprinting
  • Reconnaissance Phase (Red Team)

Use this tool only for:

โœ… Personal lab environments
โœ… Authorized penetration testing
โœ… Learning cybersecurity

โŒ Do NOT scan networks or systems without permission.

The author is not responsible for misuse.


๐Ÿงฐ Technologies Used

  • Python 3
  • Socket Programming
  • Basic Networking Concepts

๐Ÿ“ˆ Future Improvements

  • Multithreaded scanning
  • Faster async scanning
  • CIDR network scanning
  • Output report export (TXT/HTML)
  • OS fingerprinting logic

๐Ÿ‘จโ€๐Ÿ’ป Author

Piyush Mujmule

Cybersecurity Enthusiast | Aspiring DevSecOps Engineer
Focused on Ethical Hacking, Automation & Security Research.


โญ Support

If you found this project useful:

โญ Star the repository
๐Ÿด Fork and improve it
๐Ÿ›ก๏ธ Practice ethical hacking responsibly


๐Ÿ“š Learning Purpose

Part of a hands-on cybersecurity learning journey focused on real-world
penetration testing methodologies.