Our Project - Port Scanning
Our Project - Port Scanning
Team Members:
CLI Now, Web Later | Dual Mode: Attacker & Admin | High Security | Modular & Unique
🌐 Scanning Port scans (TCP, UDP, SYN, Custom scan modules + socket
stealth), banner grabbing + scapy
🧱 Detect open services & match Nmap --script vuln + CVE API
Vulnerabilitie known vulns (CVE info) integration
s
📦 Deployment CLI now (EXE & BIN), Web in Modular backend + REST-ready
future (React + Flask) APIs
Tools Required
🔧 Python Libraries
Packaging
├── main.py
├── auth/
│ ├── login.py
│ ├── register.py
│ └── encryption.py
├── scanner/
│ ├── tcp_scan.py
│ ├── udp_scan.py
│ ├── syn_scan.py
│ ├── stealth_scan.py
│ ├── port_hide.py
├── intelligence/
│ ├── whois_lookup.py
│ ├── dns_enum.py
│ ├── banner_grabber.py
│ ├── ssl_check.py
├── vulnerability/
│ ├── cve_lookup.py
│ ├── vuln_scan.py
├── modes/
│ ├── attacker_mode.py
│ ├── admin_mode.py
├── ui/
│ ├── welcome_banner.py
│ ├── cli_menu.py
│ ├── tips.py
├── logs/
│ ├── scan_logs_encrypted.json
│ └── activity.csv
├── config/
│ ├── settings.json
│ └── users.db
└── requirements.txt
Day Tasks
6 Add logout, session tracking, and fake-user blocker (IP lockout logic)
Da Tasks
y
14 Export CSV reports for admins only, add colored CLI output (rich)
Day Tasks
Da Tasks
y
Same backend (scanner, auth, vuln, etc.) will be exposed via Flask REST API.
Day Auth & Session Control ✅ Session tokens or simple logged-in flag
5 ✅ IP/Device logging
✅ AES-encrypted config file (cryptography)
Day 8 TCP Port Scanner ✅ Use socket for full TCP connect
✅ Accept domain/IP input
✅ Port range support
✅ Timeout + retry
Day 11 Stealth Scan Mode ✅ Combine delayed SYN + random port jumps
✅ Simulate anti-firewall evasion
Day 12 Scan Settings & Continuous ✅ Let user choose: one-time or periodic scan
Mode ✅ Loop scan every X minutes (configurable)
Day 20 CVE Match (API Optional) ✅ Use CVE database locally or via API (e.g. Vulners)
✅ Display severity & description
Day 21 Team Integration Test ✅ Full dry-run: login > scan > report > logout
✅ Validate attacker/admin access paths
Day GUI Polish + Navigation ✅ Add CLI help option (like help, exit)
25 ✅ Easy back to main menu
✅ Confirmations for dangerous actions
Day File Encryption & Final Log Export ✅ Finalize log format
27 ✅ Encrypt all stored data
✅ Export .csv, .json reports
REST APIs Create API endpoints to trigger scan, login, get logs
🎯 Project Title:
ShadowPortX – An Intelligent Dual-Mode Offensive & Defensive Port and Vulnerability Scanner Tool
ShadowPortX is a unique, attacker-mode inspired CLI tool designed for ethical hacking, penetration testing,
and admin port auditing. It combines multi-mode port scanning (TCP, UDP, SYN, Stealth) with advanced
vulnerability assessment, domain WHOIS data, and role-based user access. With support for port
cloaking, continuous or on-demand scanning, and encrypted data handling, ShadowPortX is beginner-
friendly, attacker-understandable, and built for secure, responsible cyber intelligence.
Modular CLI like PyPhisher – intuitive and ready for .exe packaging.
You're building something truly original — and I'm with you 100%.
Our Interface :
[0] Exit
➤ Enter your choice:
This describes the user flow for both Attacker and Admin roles using ShadowPortX.
1. Tool Launch
Options:
o [1] Login
o [2] Register
o [3] Exit
Register Flow:
Login Flow:
Verify credentials
Menu:
o [9] Logout
Menu:
o [8] Logout
Begin scan:
o Resolve DNS
Output:
Logs securely
8. Exit Tool
On logout/exit:
Access control
Feature Description