xnet-toolkit
v1.1.0
Published
Professional Network Administration and Security Toolkit
Maintainers
Readme
XNET – Professional Network Administration & Security Toolkit
XNET is a comprehensive, extensible CLI suite for network diagnostics, security auditing, traffic analysis, and administration. Designed for system administrators, DevOps, security professionals, and network engineers.
🚀 Quick Start
Clone repository
git clone https://github.com/StasX-Official/xnet.git cd xnet(Optional) Create a Python virtual environment
python3 -m venv venv source venv/bin/activate # Linux / macOS venv\Scripts\activate.bat # WindowsInstall dependencies
pip install -r requirements.txt pip install cryptography requests dnspython scapy netifaces python-iptables graphviz weasyprintInstall XNET CLI
pip install .Verify installation
xnet --help
🔧 Features
Core Network Tools
ping– Host reachabilitytraceroute– Path discoverylatency– Average round-trip timeipsweep– Ping sweep IP rangesnetmap– ARP-based network mapping
Port & Service Scanning
portscan– TCP port scan (async, rate-limited)multiscan– Multi-host port scan via CSV or CIDRlanscan– ARP scan for LAN hostsserviceenum– Banner grabbing on multiple portsdnsscan– Enumerate DNS record types
Traffic Analysis & Monitoring
sniff– Live packet capture (Scapy)arpwatch– Detect ARP spoofingnetflow– UDP NetFlow/sFlow listenerdashboard– Quick summary of devices & ports
Security & Audit
cvescan– Query NVD for CVEs on open portssslscan– TLS version, cipher suite & certificate PEMsslcert– X.509 certificate detailssslinfo– Fingerprint, issuer, validity & public key info
HTTP & API
httpget– HTTP(S) GET with header/body previewapirequest– Generic REST client with JSON payload
Packet & Firewall Management
packet– Craft & send custom TCP/UDP/ICMP packetsknock– Port knocking listener & senderserve– Simple HTTP fileserver
Configuration & Extensibility
cfg– Show, get or set values inconfig.jsoncfgdrift– Monitor or check config file driftreport– Generate HTML or PDF report from logsplugin– List, install or run external plugins
📖 Command Reference
# Diagnose connectivity
xnet ping <host>
xnet traceroute <host>
xnet latency <host> [count]
# Port scans
xnet portscan <host> [start] [end]
xnet multiscan <hosts> [ports]
# LAN and DNS
xnet lanscan [network/CIDR]
xnet dnsscan <domain>
xnet lookup <hostname>
# Packet capture & ARP monitoring
xnet sniff [iface] [filter] [count]
xnet arpwatch [iface] [duration]
# Security checks
xnet cvescan <host> [start] [end]
xnet sslscan <host> [port]
xnet sslcert <host> [port]
xnet sslinfo <host> [port]
# HTTP & API
xnet httpget <url>
xnet apirequest <METHOD> <url> [json_data]
# Custom packets & firewall
xnet packet <tcp|udp|icmp> <target> [port] [flags] [payload]
xnet knock <start|list|send> [sequence]
xnet serve <dir> [host] [port]
# Configuration & Logs
xnet cfg show|get|set [key] [value]
xnet cfgdrift monitor|status
xnet report <html|pdf> [basename]
xnet log view|clear
# Plugin system
xnet plugin list|install|run [name] [args...]
# Help & interactive
xnet help
xnet interactive💡 Examples
Scan localhost TCP ports 1–100
xnet portscan 127.0.0.1 1 100Sweep an IP range
xnet ipsweep 192.168.1.1 192.168.1.254Capture 500 packets on eth0
xnet sniff eth0 "" 500Detect ARP spoof attempts for 5 minutes
xnet arpwatch eth0 300Query HTTP headers and body
xnet httpget https://example.comSend custom TCP SYN to port 22
xnet packet tcp 192.168.1.100 22 S "Hello"Generate PDF report from logs
xnet report pdf my-report
⚙️ Configuration
All settings stored in xnet_system/config.json:
{
"version": "1.1.0",
"max_ports": 500,
"async_threads": 50,
"security": { ... },
"advanced_features": {
"packet_sniffer": { "max_capture_time": 60, "max_packets": 1000 },
"arp_watch": { "monitoring_time": 300 },
"port_knock": { "sequences": { ... }, "open_port": 22 },
"packet_sender": { "default_ttl": 64, "max_payload_size": 1024 }
}
}Use xnet cfg to view or update values without editing manually.
🧩 Plugins
Place your plugin Python file under
xnet_system/plugins/<name>.pyImplement a
main(*args)function.List available plugins:
xnet plugin listRun a plugin:
xnet plugin run <name> [args...]
🛠 Interactive Mode & Autocomplete
Enable shell completion in bash:
source bash_completion.shStart interactive session:
xnet interactiveUse Tab for commands and parameters, Ctrl+C to exit.
🆘 Troubleshooting & Support
- Check logs at
~/.xnet/logs/xnet.log - Common issues: missing privileges, firewall blocking, module imports
Email: [email protected]
GitHub Issues: https://github.com/StasX-Official/xnet/issues
📜 License
This project is released under the MIT License.
© 2025 StasX (Kozosvyst Stas). All rights reserved.
