HacktiveMindset/Mini-Network-Scanner-Mini-Nmap-
A Python-based Network Reconnaissance Tool that performs host discovery, port scanning, and service/banner detection --- inspired by real-world penetration testing workflows.
๐ Mini Network Scanner (Mini Nmap)
A Python-based Network Reconnaissance Tool that performs host
discovery, port scanning, and service/banner detection --- inspired by
real-world penetration testing workflows.
This project demonstrates how cybersecurity professionals enumerate
network targets during the reconnaissance phase.
โ ๏ธ Built for educational and ethical security testing only.
๐ Features
โ
Host Discovery (Check if target is alive)
โ
TCP Port Scanning (1--1024 ports)
โ
Service / Banner Detection
โ
Automated Recon Output
โ
Beginner-Friendly Security Automation
๐ง Project Objective
This project helps understand:
- Network Reconnaissance Techniques
- Port Scanning Fundamentals
- Service Enumeration
- Penetration Testing Workflow
- Python Automation for Security
๐๏ธ Project Structure
network_scanner/
โ
โโโ scanner.py # Main execution file
โโโ host_discovery.py # Host availability check
โโโ port_scanner.py # Port scanning logic
โโโ banner_grabber.py # Service detection
โโโ requirements.txt
โ๏ธ Installation
1๏ธโฃ Clone Repository
git clone https://github.com/HacktiveMindset/Mini-Network-Scanner-Mini-Nmap-.git
cd Mini-Network-Scanner-Mini-Nmap-2๏ธโฃ Install Dependencies
pip install -r requirements.txtโถ๏ธ Usage
Run the scanner:
python scanner.pyEnter target:
scanme.nmap.org
๐ Example Output
=== Mini Network Scanner ===
[+] Checking if host is alive...
[ALIVE] Host reachable
[+] Scanning ports...
[OPEN] Port 22
[OPEN] Port 80
===== SERVICE DETECTION =====
Port 22: OpenSSH
Port 80: Apache HTTP Server
===== SCAN COMPLETE =====
๐ How It Works
1. Host Discovery
Checks DNS resolution to confirm the host is reachable.
2. Port Scanning
Uses Python sockets to test TCP connections across common ports.
3. Banner Grabbing
Attempts to retrieve service banners to identify running services.
๐ก๏ธ Security Concepts Covered
- Network Enumeration
- Attack Surface Discovery
- Service Fingerprinting
- Reconnaissance Phase (Red Team)
โ ๏ธ Legal Disclaimer
Use this tool only for:
โ
Personal lab environments
โ
Authorized penetration testing
โ
Learning cybersecurity
โ Do NOT scan networks or systems without permission.
The author is not responsible for misuse.
๐งฐ Technologies Used
- Python 3
- Socket Programming
- Basic Networking Concepts
๐ Future Improvements
- Multithreaded scanning
- Faster async scanning
- CIDR network scanning
- Output report export (TXT/HTML)
- OS fingerprinting logic
๐จโ๐ป Author
Piyush Mujmule
Cybersecurity Enthusiast | Aspiring DevSecOps Engineer
Focused on Ethical Hacking, Automation & Security Research.
โญ Support
If you found this project useful:
โญ Star the repository
๐ด Fork and improve it
๐ก๏ธ Practice ethical hacking responsibly
๐ Learning Purpose
Part of a hands-on cybersecurity learning journey focused on real-world
penetration testing methodologies.