- Grudarin is a network monitoring tool that captures and analyzes real-time traffic, showing active connections, IP addresses, ports, and protocols. It helps detect anomalies, monitor bandwidth usage, and identify devices on a network. The tool supports deep inspection with features like promiscuous mode for comprehensive analysis. While its real-time visibility is strong, it requires longer scans for accurate threat detection.
- real-time packet monitoring
- node-level vulnerability scanning
- built-in graph dashboard (native GUI)
- markdown + JSON reporting
Important
This tool is under active development.
- Real-time LAN topology graph with smooth force simulation
- Native built-in graph view (no external graph framework)
- Flat orange/red nodes on a black dashboard
- Live edge relation labels and per-node connection labels
- Node inspector with:
- IP, MAC, hostname, vendor, OS hint
- protocols, services, open ports
- packets/bytes and connected peers
- One-click node scan and scan-all-visible-nodes
- Live dashboard charts:
- protocol distribution
- node type distribution
- relation/link type counts
- top talkers
- realtime timeline (nodes/events/bytes)
- Site scan mode with graph entities:
- DNS_NAME, IP_ADDRESS, IP_RANGE, OPEN_TCP_PORT
- URL, EMAIL_ADDRESS, STORAGE_BUCKET
- ORG_STUB, USER_STUB
- TECHNOLOGY, VULNERABILITY
| Language | Component | Purpose |
|---|---|---|
| Python | Core engine (grudarin/) |
Packet capture (Scapy), data model, CLI, orchestration |
| C++ | Port scanner (scanner/scanner.cpp) |
Multi-threaded TCP port scanning, banner grabbing, CVE detection |
| Go | Network probe (netprobe/netprobe.go) |
Concurrent host discovery, ARP table lookup, TCP fingerprinting |
| Lua | Rules engine (lua_rules/security_rules.lua) |
Extensible security rules, misconfig detection, anomaly analysis |
| Bash | Install/Update/Uninstall (*.sh) |
Cross-distro system setup, compilation, dependency management |
| Batch | Windows installer (install.bat) |
Windows setup with MSVC/MinGW support |
visit the usage.md for more details : Tap for more details.
git clone https://github.com/Chintanpatel24/grudarin.git
cd grudarin
chmod +x install.sh
sudo ./install.sh1. Install Python 3.8+
2. Install Npcap (WinPcap compatibility mode)
3. Open CMD as Administrator
4. cd grudarin
5. install.bat
pip install scapy pygame
g++ -std=c++17 -O2 -Wall -pthread -o bin/grudarin_scanner scanner/scanner.cpp -lpthread
cd netprobe && go build -o ../bin/grudarin_netprobe netprobe.go && cd ..- Real-time packet capture with protocol analysis (TCP, UDP, ICMP, ARP, DNS, DHCP, HTTP, HTTPS, SSH, FTP, SMB, RDP, SNMP, and more)
- Live force-directed graph that updates as devices appear and communicate
- Node labels showing IP, MAC address, vendor, hostname, and open ports under each device
- Protocol labels on graph edges showing what protocols flow between devices
- C++ port scanner with 38 vulnerability signatures and 34 dangerous port definitions
- Go network probe for fast concurrent host discovery across entire subnets
- Lua security rules with 12 rule categories (extensible with custom rules)
- WiFi network discovery showing available SSIDs, BSSIDs, signal strength
- LAN detection showing connected interfaces, gateways, and routes
- ARP spoofing detection (multiple MACs claiming same IP)
- Broadcast storm detection (excessive broadcast traffic ratios)
- DNS anomaly detection (potential tunneling or exfiltration)
- Outdated software detection (old SSH, Apache, nginx, PHP, IIS versions)
- Known backdoor detection (vsFTPd 2.3.4, ProFTPD 1.3.3)
- Markdown reports with security findings in red bold HTML at the end
- JSON data export for machine processing
- Zero tracking, zero telemetry - completely offline and private
Note
- Network Monitor + Vulnerability Scanner + Force-Directed Graph
- Grudarin is an open-source cybersecurity tool that monitors networks in real time, discovers devices, scans for vulnerabilities and misconfigurations, visualizes the network topology as a live force-directed graph, and saves detailed reports in Markdown with security findings highlighted in red bold text.
