███╗ ██╗███████╗████████╗███████╗████████╗ █████╗ ██╗ ██╗ ██╗███████╗██████╗
████╗ ██║██╔════╝╚══██╔══╝██╔════╝╚══██╔══╝██╔══██╗██║ ██║ ██╔╝██╔════╝██╔══██╗
██╔██╗ ██║█████╗ ██║ ███████╗ ██║ ███████║██║ █████╔╝ █████╗ ██████╔╝
██║╚██╗██║██╔══╝ ██║ ╚════██║ ██║ ██╔══██║██║ ██╔═██╗ ██╔══╝ ██╔══██╗
██║ ╚████║███████╗ ██║ ███████║ ██║ ██║ ██║███████╗██║ ██╗███████╗██║ ██║
╚═╝ ╚═══╝╚══════╝ ╚═╝ ╚══════╝ ╚═╝ ╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝
═══════════ ⚡ Cyberpunk Penetration Testing Arsenal ⚡ ══════════
[ Ethical Hacking Framework • Rose Pine Themed • v2.0 CYBER ]
NETSTALKER is a comprehensive, cyberpunk-themed penetration testing framework designed for ethical hackers, security professionals, and CTF players. Built with a focus on automation, flexibility, and aesthetics, it combines powerful security tools with a beautiful Rose Pine color scheme and intuitive command-line interface.
- 🎨 Rose Pine Cyberpunk Theme - Beautiful terminal aesthetics inspired by neon-lit cityscapes
- ⚡ Multiple RustScan Presets - Fast, full, stealth, and custom scanning modes
- 🔧 Tool-Specific CLI Arguments - Clear, explicit command names (no generic flags)
- 📊 Universal -oA Output - All scans save in .nmap, .xml, and .gnmap formats
- 🎯 Anonymous Access Testing - Comprehensive testing for 12+ services
- 🪟 Active Directory Enumeration - Complete AD attack chain support
- 🌐 Web Application Testing - Integrated web fuzzing and vulnerability scanning
- 🛠️ System Setup Integration - Voidwalker installation script included
- 📁 Organized Output Structure - Clean, categorized scan results
- 🎮 Dual Interface - Both CLI arguments and interactive menus
# Clone the repository
git clone https://github.com/yourusername/netstalker.git
cd netstalker
# Setup your system (installs 250+ security tools)
python voidwalker.py --setup-full
# Run NETSTALKER
python netstalker.py
# Quick scan example
python netstalker.py -t 10.10.10.10 --rustscan-full --anon-all- Installation
- RustScan Modes
- Nmap Enumeration
- Web Application Testing
- Active Directory
- Anonymous Testing
- SMB/NetBIOS
- CLI Reference
- Output Structure
- Workflow Examples
- Theme
- Legal & Ethics
- Operating System: Kali Linux, Ubuntu 22.04+, Debian 11+
- Python: 3.8 or higher
- Privileges: sudo access for some operations
# 1. Clone repository
git clone https://github.com/yourusername/netstalker.git
cd netstalker
# 2. Install Python dependencies
pip3 install -r requirements.txt
# 3. Run system setup (optional but recommended)
python voidwalker.py --setup-quick # Essential tools (~10 min)
# OR
python voidwalker.py --setup-full # All 250+ tools (~60 min)
# 4. Verify installation
python netstalker.py --check-toolsNETSTALKER provides 4 optimized RustScan presets for different scenarios:
python netstalker.py -t 10.10.10.10 --rustscan-fast- Ports: Top 1000 common ports
- Speed: ~30 seconds
- Use Case: Initial reconnaissance, CTF time limits
python netstalker.py -t 10.10.10.10 --rustscan-full- Ports: All 65535 ports
- Speed: ~5-10 minutes
- Use Case: Comprehensive enumeration, professional pentests
python netstalker.py -t 10.10.10.10 --rustscan-stealth- Ports: All ports, slow timing
- Speed: ~30-60 minutes
- Use Case: IDS/IPS evasion, production environments
python netstalker.py -t 10.10.10.10 --rustscan-custom -- -A -oA myscan --script vuln- Custom Nmap arguments after
-- - Use Case: Maximum flexibility, specific enumeration needs
Tool-specific Nmap commands for targeted enumeration:
python netstalker.py -t 10.10.10.10 --nmap-adRuns 16 AD-specific NSE scripts for comprehensive AD enumeration.
python netstalker.py -t 10.10.10.10 --nmap-webRuns 20+ web-specific NSE scripts including vulnerability detection.
python netstalker.py -t 10.10.10.10 --nmap-vulnComprehensive vulnerability scanning with all vuln scripts.
Direct tool invocation for web enumeration:
# Gobuster directory brute-force
python netstalker.py -t http://10.10.10.10 --gobuster -x php,html,txt
# ffuf fast fuzzing
python netstalker.py -t http://10.10.10.10 --ffuf -w /path/to/wordlist.txt
# Nikto web vulnerability scan
python netstalker.py -t http://10.10.10.10 --nikto
# Nuclei template-based scanning
python netstalker.py -t http://10.10.10.10 --nuclei --severity critical,high
# FeroxBuster recursive discovery
python netstalker.py -t http://10.10.10.10 --feroxbuster -x php --depth 4Complete AD attack chain with tool-specific commands:
python netstalker.py -t 10.10.10.10 -d CORP.LOCAL --asreproast
python netstalker.py -t 10.10.10.10 -d CORP.LOCAL --asreproast --users users.txtpython netstalker.py -t 10.10.10.10 -d CORP.LOCAL --kerberoast -u user -p passwordpython netstalker.py -t 10.10.10.10 -d CORP.LOCAL --secretsdump -u admin -p passwordpython netstalker.py -t 10.10.10.10 -d CORP.LOCAL --bloodhound -u user -p passwordpython netstalker.py -t 10.10.10.10 --netexec-hostsComprehensive anonymous/null session testing:
# Test all services
python netstalker.py -t 10.10.10.10 --anon-all
# Service-specific testing
python netstalker.py -t 10.10.10.10 --anon-ftp
python netstalker.py -t 10.10.10.10 --anon-smb
python netstalker.py -t 10.10.10.10 --anon-ldap
python netstalker.py -t 10.10.10.10 --anon-mysql
python netstalker.py -t 10.10.10.10 --anon-redis
python netstalker.py -t 10.10.10.10 --anon-mongo
# Combined scan + anonymous testing
python netstalker.py -t 10.10.10.10 --rustscan-full --anon-allTests: FTP, SMB, LDAP, MySQL, PostgreSQL, Redis, MongoDB, SNMP, NFS, rsync, telnet, RPC
# enum4linux
python netstalker.py -t 10.10.10.10 --enum4linux -u user -p password
# SMBClient
python netstalker.py -t 10.10.10.10 --smbclient --no-pass
# NetExec SMB
python netstalker.py -t 10.10.10.10 --netexec-smb -u user -p password --spider
# RPCClient
python netstalker.py -t 10.10.10.10 --rpcclient| Argument | Description | Speed | Coverage |
|---|---|---|---|
--rustscan-fast |
Top 1000 ports | ~30s | Common |
--rustscan-full |
All 65535 ports | ~10min | Complete |
--rustscan-stealth |
Slow, evasive | ~60min | Complete |
--rustscan-custom -- |
Custom args | Variable | Custom |
| Argument | Description |
|---|---|
--nmap-ad |
Active Directory enumeration (16 scripts) |
--nmap-web |
Web application enumeration (20+ scripts) |
--nmap-vuln |
Vulnerability scanning |
--nmap-smb |
SMB enumeration |
| Argument | Tool |
|---|---|
--gobuster |
Directory brute-forcing |
--ffuf |
Fast web fuzzer |
--nikto |
Web vulnerability scanner |
--nuclei |
Template-based scanning |
--feroxbuster |
Recursive directory discovery |
| Argument | Description | Auth |
|---|---|---|
--asreproast |
AS-REP roasting | No |
--kerberoast |
Kerberoasting | User |
--secretsdump |
DCSync | Admin |
--bloodhound |
BloodHound collection | User |
--netexec-hosts |
Generate /etc/hosts | No |
| Argument | Service |
|---|---|
--anon-all |
Test all services |
--anon-ftp |
FTP anonymous login |
--anon-smb |
SMB null session |
--anon-ldap |
LDAP anonymous bind |
--anon-mysql |
MySQL no password |
--anon-redis |
Redis no auth |
--anon-mongo |
MongoDB no auth |
results/
└── <target_ip>/
├── scans/
│ ├── nmap_<target>_<time>.nmap # Normal output
│ ├── nmap_<target>_<time>.xml # XML output
│ └── nmap_<target>_<time>.gnmap # Greppable output
├── services/
│ ├── enum4linux_<target>.txt
│ ├── netexec_smb_<target>.txt
│ └── netexec_hosts_<target>.txt
├── ad/
│ ├── asrep_<domain>.txt
│ ├── kerberoast_<domain>.txt
│ └── bloodhound_*.json
├── web/
│ ├── gobuster_dir_<target>.txt
│ ├── nuclei_<target>.txt
│ └── nikto_<target>.txt
└── anonymous/
├── ftp_anon_<target>.txt
└── smb_anon_<target>.txt
All Nmap scans use -oA to save in all three formats automatically.
# Fast initial scan
python netstalker.py -t 10.10.10.10 --rustscan-fast
# Full scan with anonymous testing
python netstalker.py -t 10.10.10.10 --rustscan-full --anon-all
# If AD detected
python netstalker.py -t 10.10.10.10 --nmap-ad
python netstalker.py -t 10.10.10.10 --netexec-hosts
python netstalker.py -t 10.10.10.10 -d HTB.LOCAL --asreproast
# If web services found
python netstalker.py -t 10.10.10.10 --nmap-web
python netstalker.py -t http://10.10.10.10 --gobuster -x php,txt# Comprehensive scan
python netstalker.py -t 10.0.0.10 --rustscan-full
# AD enumeration
python netstalker.py -t 10.0.0.10 --nmap-ad
python netstalker.py -t 10.0.0.10 -d CORP.LOCAL --bloodhound -u user -p pass
# SMB enumeration
python netstalker.py -t 10.0.0.10 --netexec-smb -u user -p pass --spider# Web-focused scan
python netstalker.py -t 10.10.10.50 --nmap-web
# Directory enumeration
python netstalker.py -t http://10.10.10.50 --gobuster -x php,html,asp
# Vulnerability scanning
python netstalker.py -t http://10.10.10.50 --nikto
python netstalker.py -t http://10.10.10.50 --nuclei --severity critical| Color | Hex | Usage |
|---|---|---|
| Foam (Cyan) | #56949f | Highlights |
| Iris (Purple) | #907aa9 | Headers |
| Pine (Teal) | #286983 | Success |
| Love (Red) | #b4637a | Errors |
| Gold (Orange) | #ea9d34 | Warnings |
Customize colors in modules/theme.py.
# Quick setup (essential tools, ~10 min)
python voidwalker.py --setup-quick
# Full setup (250+ tools, ~60 min)
python voidwalker.py --setup-fullIncludes: nmap, rustscan, netexec, gobuster, ffuf, nikto, nuclei, Impacket, BloodHound, and 240+ more tools.
Use of this tool for attacking targets without prior mutual consent is illegal.
✅ Authorized penetration testing with written permission ✅ CTF competitions (HackTheBox, TryHackMe, etc.) ✅ Security research in controlled environments ✅ Educational purposes on your own systems ✅ Bug bounty programs within scope
❌ Unauthorized access to computer systems ❌ Attacking targets without permission ❌ Violating terms of service ❌ Malicious hacking
The authors are not responsible for any illegal use of this software.
- 250+ Tools in Voidwalker setup
- 16 AD NSE Scripts in --nmap-ad
- 20+ Web NSE Scripts in --nmap-web
- 12+ Services for anonymous testing
- 4 RustScan Presets
- All 3 output formats (.nmap, .xml, .gnmap)
╔════════════════════════════════════════════════════════════╗
║ NETSTALKER v2.0 CYBER ║
║ "Jack in. Own the network. Disconnect." ║
╚════════════════════════════════════════════════════════════╝
⚡ Cyberpunk Penetration Testing Arsenal ⚡