Skip to content

xtawb/Shadowolf

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Shadowolf Logo

SHADOWOLF

Internal Network Scanning Tool.

Python Version License Version

Shadowolf - Internal Network Scanning Tool 🐺

Shadowolf is an advanced internal network auditing tool designed for red teams and cybersecurity professionals. It provides real-time network reconnaissance with high-precision scanning capabilities and automated PDF reporting.


🌟 Key Features

  • Real-Time Network Mapping

    • Lightning-fast ARP scanning (1000+ devices per second)
    • MAC address vendor identification (75+ OUI database)
    • Layer 2/3 topology visualization
  • Advanced Vulnerability Assessment

    • CVE-based vulnerability detection (e.g., CVE-2023-XXXX, CVE-2022-XXXX)
    • Severity classification (Critical/High/Medium/Low)
    • Weak configuration detection (default SSH/FTP credentials)
  • OS Fingerprinting

    • Accurate OS detection (Windows/Linux/macOS/Embedded systems)
    • Service version enumeration (HTTP/SMB/SQL)
  • Automated Reporting

    • Detailed PDF reports with color-coded findings
    • Executive summaries and technical details
    • Risk prioritization matrix
  • Stealth Mode

    • Randomized scan timing (to evade IDS/IPS)
    • No external dependencies (fully offline operation)

🛠 Installation

Requirements

  • Python 3.8+
  • Root/Administrator privileges
  • libpcap-dev (Linux) / WinPcap (Windows)
# Clone the repository
git clone https://github.com/xtawb/Shadowolf.git
cd Shadowolf

# Install dependencies
pip3 install --break-system-packages -r requirements.txt

Supported Platforms

  • Kali Linux 2023.1+
  • Ubuntu 20.04/22.04
  • Windows 10/11 (WSL2 recommended)

Usage

Basic Command Structure

python3 Shadowolf.py [TARGET] [OPTIONS] --output [REPORT_NAME.pdf]

Full Command Reference

Option Description
--arp Perform lightning-fast ARP discovery (Layer 2)
--os Advanced OS fingerprinting (TCP/IP stack analysis)
--vuln Full vulnerability assessment (CVE/NVD database integration)
--weak Detect weak configurations (default credentials, open shares)
--full Complete network audit (ARP + OS + Vuln + Weak)
--output Custom report filename (default: wolf_report.pdf)

Example Scenarios

1. Full Network Audit

python3 Shadowolf.py 192.168.1.0/24 --full --output enterprise_audit.pdf

2. Targeted Vulnerability Scan

python3 Shadowolf.py 10.0.0.5 --vuln --output critical_hosts.pdf

3. Device Inventory Scan

python3 Shadowolf.py 172.16.0.0/16 --arp --os --output asset_report.pdf

Sample Report Preview

Terminal Output:

[14:35:22] [DEVICE] 192.168.1.5 (00:0C:29:XX:XX:XX) - VMware ESXi
[14:35:23] [CRITICAL] 192.168.1.5:445 - CVE-2021-34527 (PrintNightmare)
[14:35:24] [WEAK] 192.168.1.5:22 - Weak SSH config detected!

🔗 Terminal Output Image

PDF Report Structure:

1. Executive Summary
2. Network Topology Map
3. Critical Vulnerabilities
   - CVE-2021-34527 (CVSS 9.8)
   - CVE-2022-30190 (CVSS 8.8)
4. Device Inventory
5. Recommended Mitigations

Contributing

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/AmazingFeature)
  3. Commit changes (git commit -m 'Add AmazingFeature')
  4. Push to branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

Coding Standards:

  • PEP8 compliance
  • Type hinting required
  • 100% test coverage for new features

License

Distributed under MIT License. See LICENSE for details.


Contact

Author: xtawb
contact: @xtawb


🌐 Acknowledgements

  • Nmap Project Team
  • Scapy Development Community
  • CVE Database Maintainers
  • Open Source Security Foundation (OpenSSF)

About

Real-Time Internal Network Sentinel.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages