- Notifications
You must be signed in to change notification settings - Fork0
🛠️ The scanning engine behind NVS – automates WiFi detection, device fingerprinting, and vulnerability analysis from the command line.
License
undertry/nvs-core
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
nvs-core
is the backend engine of theNVS (Network Vulnerability Scanner) project. It contains CLI scripts and scanning logic to detect device services, open ports, and potential WiFi vulnerabilities. Designed to be used standalone or through thenvs-web
interface.
- 🔍 Scan for active WiFi networks
- 🧪 Check for open ports and known vulnerabilities
- ⚙️ Perform device service fingerprinting
- 📡 Prepare data for web visualization via API (used by
nvs-web
)
Category | Technology |
---|---|
Language | Python 3.8+ |
Networking | nmap ,nmcli |
API (optional) | Flask (minimal API bridge) |
Execution Type | CLI / Script-based |
- Python 3.8+
nmap
installed- Linux or Unix-like system (recommended)
- (Optional) Flask for API mode
git clone https://github.com/undertry/nvs-core.gitcd nvs-core
python3 -m venv venvsource venv/bin/activate
pip install -r requirements.txt
python3 scanner.py
Or use specific tools:
bash scripts/scan_wifi.shbash scripts/scan_ports.sh
python3 api_server.py
The API will be available athttp://localhost:5000
.
nvs-core/├── scripts/ → Shell scripts for network scanning├── scanner.py → Main Python scanner script├── api_server.py → Optional Flask API├── requirements.txt → Python dependencies└── README.md → You are here
- nvs-web – Web interface that connects to
nvs-core
to visualize scans and control actions remotely.
- CLI & Backend:@undertry (Tiago Comba)
This project is licensed under theGPL-2.0 License. See theLICENSE file for details.
“Scan smart. Stay secure.” 🔒
About
🛠️ The scanning engine behind NVS – automates WiFi detection, device fingerprinting, and vulnerability analysis from the command line.
Topics
Resources
License
Uh oh!
There was an error while loading.Please reload this page.