An enterprise-grade, multi-threaded tactical network scanner and threat intelligence mapping application. Built with Python and PySide6, featuring a fully responsive dual-language GUI (Arabic/English) with native Right-to-Left (RTL) layout support.
- Adaptive Timing Evasion: Employs smart socket connection distribution using random time delays to bypass IDS/IPS intrusion sensors.
- Source Port Spoofing: Forces connections through trusted enterprise ports (e.g., Port 53 for DNS) to evade strict packet filtering.
- Subdomain Enumeration Engine: Passive and active domain indexing discovery.
- Live Vulnerability Intelligence: Direct integration with distributed CVE mapping to identify potential Metasploit exploitation vectors.
- Exposed Web Path Discovery: Automatic crawling for directory traversal and exposed files (
/admin,.env,backup.sql).
Before running the scanning engine, you must install the following software driver on your host machine to enable raw connection probing and packet binding:
- Npcap (Windows Packet Capture Library):
- Download the official installation package directly from: https://npcap.com
- Important Driver Configuration: You MUST check the option "Install Npcap in WinPcap API-compatible Mode" during the setup process. Without this driver configuration, raw network bindings will be restricted by the Windows Kernel.
To install the dependencies and execute the script directly on your system, run the following commands:
# Clone the repository
git clone https://github.com
cd Advanced-Stealth-Scanner
# Install dependencies directly to your system
pip install -r requirements.txt
# Execution (Requires Elevated Administrator Privileges)
python Stealth_Scanner.pyTo compile the system into a single standalone binary with native icon resource embedding:
pyinstaller --noconsole --onefile --icon=robot.ico Stealth_Scanner.pyDistributed under the MIT License. See LICENSE for more information.