N-ETHER (Network Enumeration Tool for Host Exploration and Reconnaissance) is a robust and highly automated Python script designed to streamline the critical initial phases of network security auditing and penetration testing.
It’s core purpose is to perform fast, comprehensive, and consistent host and port discovery across single targets or large lists of IP addresses. N-ETHER functions as an intelligent, opinionated wrapper around the powerful nmap tool, bundling best-practice scanning techniques—including service versioning, NSE scripting, and intelligent port selection—into a single, easy-to-use utility. This significantly reduces auditor workload and potential for human error compared to manually executing multiple complex nmap commands.

Read the README!!!

Features

  • Concurrent Scanning**: Scans multiple targets simultaneously using threads
  • Quick Scan (`-q`): Scans top 100 ports
  • Full Scan**: Scans all ports (default)
  • dvanced Audit (`-a`): Runs NSE scripts (ftp-anon, smb-enum-shares, etc.)
  • IPv6 Support (`-6`): Enables scanning of IPv6 addresses
  • Proxy Support (`-x`): Routes traffic through a SOCKS5 proxy
  • Host Discovery (`-d`): Enables Ping/ARP discovery (defaults to skip-ping)
  • Target Flexibility: Accepts a single IP or a file containing a list of targets
  • Reporting: Consolidates results into a single summary file.

Project Samples

Project Activity

See All Activity >

License

GNU General Public License version 3.0 (GPLv3)

Follow Network Enumeration Tool

Network Enumeration Tool Web Site

Other Useful Business Software
Go From AI Idea to AI App Fast Icon
Go From AI Idea to AI App Fast

One platform to build, fine-tune, and deploy ML models. No MLOps team required.

Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Network Enumeration Tool !

Additional Project Details

Operating Systems

Android, Linux, Windows

Intended Audience

End Users/Desktop, Security Professionals, System Administrators, Testers

User Interface

Command-line, Console/Terminal

Registered

2026-01-28