npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

xnet-toolkit

v1.1.0

Published

Professional Network Administration and Security Toolkit

Readme

XNET – Professional Network Administration & Security Toolkit

GitHub Release Python License

XNET is a comprehensive, extensible CLI suite for network diagnostics, security auditing, traffic analysis, and administration. Designed for system administrators, DevOps, security professionals, and network engineers.


🚀 Quick Start

  1. Clone repository

    git clone https://github.com/StasX-Official/xnet.git
    cd xnet
  2. (Optional) Create a Python virtual environment

    python3 -m venv venv
    source venv/bin/activate    # Linux / macOS
    venv\Scripts\activate.bat   # Windows
  3. Install dependencies

    pip install -r requirements.txt
    pip install cryptography requests dnspython scapy netifaces python-iptables graphviz weasyprint
  4. Install XNET CLI

    pip install .
  5. Verify installation

    xnet --help

🔧 Features

Core Network Tools

  • ping – Host reachability
  • traceroute – Path discovery
  • latency – Average round-trip time
  • ipsweep – Ping sweep IP ranges
  • netmap – ARP-based network mapping

Port & Service Scanning

  • portscan – TCP port scan (async, rate-limited)
  • multiscan – Multi-host port scan via CSV or CIDR
  • lanscan – ARP scan for LAN hosts
  • serviceenum – Banner grabbing on multiple ports
  • dnsscan – Enumerate DNS record types

Traffic Analysis & Monitoring

  • sniff – Live packet capture (Scapy)
  • arpwatch – Detect ARP spoofing
  • netflow – UDP NetFlow/sFlow listener
  • dashboard – Quick summary of devices & ports

Security & Audit

  • cvescan – Query NVD for CVEs on open ports
  • sslscan – TLS version, cipher suite & certificate PEM
  • sslcert – X.509 certificate details
  • sslinfo – Fingerprint, issuer, validity & public key info

HTTP & API

  • httpget – HTTP(S) GET with header/body preview
  • apirequest – Generic REST client with JSON payload

Packet & Firewall Management

  • packet – Craft & send custom TCP/UDP/ICMP packets
  • knock – Port knocking listener & sender
  • serve – Simple HTTP fileserver

Configuration & Extensibility

  • cfg – Show, get or set values in config.json
  • cfgdrift – Monitor or check config file drift
  • report – Generate HTML or PDF report from logs
  • plugin – List, install or run external plugins

📖 Command Reference

# Diagnose connectivity
xnet ping <host>
xnet traceroute <host>
xnet latency <host> [count]

# Port scans
xnet portscan <host> [start] [end]
xnet multiscan <hosts> [ports]

# LAN and DNS
xnet lanscan [network/CIDR]
xnet dnsscan <domain>
xnet lookup <hostname>

# Packet capture & ARP monitoring
xnet sniff [iface] [filter] [count]
xnet arpwatch [iface] [duration]

# Security checks
xnet cvescan <host> [start] [end]
xnet sslscan <host> [port]
xnet sslcert <host> [port]
xnet sslinfo <host> [port]

# HTTP & API
xnet httpget <url>
xnet apirequest <METHOD> <url> [json_data]

# Custom packets & firewall
xnet packet <tcp|udp|icmp> <target> [port] [flags] [payload]
xnet knock <start|list|send> [sequence]
xnet serve <dir> [host] [port]

# Configuration & Logs
xnet cfg show|get|set [key] [value]
xnet cfgdrift monitor|status
xnet report <html|pdf> [basename]
xnet log view|clear

# Plugin system
xnet plugin list|install|run [name] [args...]

# Help & interactive
xnet help
xnet interactive

💡 Examples

  • Scan localhost TCP ports 1–100
    xnet portscan 127.0.0.1 1 100

  • Sweep an IP range
    xnet ipsweep 192.168.1.1 192.168.1.254

  • Capture 500 packets on eth0
    xnet sniff eth0 "" 500

  • Detect ARP spoof attempts for 5 minutes
    xnet arpwatch eth0 300

  • Query HTTP headers and body
    xnet httpget https://example.com

  • Send custom TCP SYN to port 22
    xnet packet tcp 192.168.1.100 22 S "Hello"

  • Generate PDF report from logs
    xnet report pdf my-report


⚙️ Configuration

All settings stored in xnet_system/config.json:

{
  "version": "1.1.0",
  "max_ports": 500,
  "async_threads": 50,
  "security": { ... },
  "advanced_features": {
    "packet_sniffer": { "max_capture_time": 60, "max_packets": 1000 },
    "arp_watch":     { "monitoring_time": 300 },
    "port_knock":    { "sequences": { ... }, "open_port": 22 },
    "packet_sender": { "default_ttl": 64, "max_payload_size": 1024 }
  }
}

Use xnet cfg to view or update values without editing manually.


🧩 Plugins

  1. Place your plugin Python file under
    xnet_system/plugins/<name>.py

  2. Implement a main(*args) function.

  3. List available plugins:
    xnet plugin list

  4. Run a plugin:
    xnet plugin run <name> [args...]


🛠 Interactive Mode & Autocomplete

Enable shell completion in bash:

source bash_completion.sh

Start interactive session:

xnet interactive

Use Tab for commands and parameters, Ctrl+C to exit.


🆘 Troubleshooting & Support

  • Check logs at ~/.xnet/logs/xnet.log
  • Common issues: missing privileges, firewall blocking, module imports

Email: [email protected]
GitHub Issues: https://github.com/StasX-Official/xnet/issues


📜 License

This project is released under the MIT License.
© 2025 StasX (Kozosvyst Stas). All rights reserved.