/// LEAVE NO STONE UNTURNED ///
You are in a CTF or a Pentest. You run a standard nmap scan. It checks the top 1,000 ports. You see port 80 and 445. You attack them for 3 hours and get nowhere.
The Reality: The target had a hidden administrative console on Port 6520. Nmap missed it. You missed the shell.
Syntropy Scanner automates the "Discovery" phase of a penetration test. It runs two scans simultaneously (Fast Nmap + Full Rustscan) and performs a Gap Analysis. If Rustscan finds a port that Nmap missed, it triggers a RED ALERT. It ends with producing a clean HTML report of the entire comprehensive scan on the target.
| Feature | π’ Standard Edition (Syntropy_scanner.py) |
π΄ Ultimate Edition (Syntropy_Scanner_Ultimate.py) |
|---|---|---|
| Speed | β‘ Instant | π’ Slower (Deep Analysis) |
| Gap Analysis | β Yes | β Yes |
| Visual Dashboard | β HTML report | β HTML report |
| UDP Support | β No | β Optional Module |
| Root Required | β No | β Yes (For UDP/OS Detect) |
Don't just stare at terminal output. Syntropy generates clean HTML report for every scanβperfect for documentation on pentest reports.
Prerequisites:
python3nmaprustscan(Install Guide)xsltproc(Required for HTML reports:sudo apt install xsltproc)
# 1. Clone the repository
# 2. Enter directory
cd Syntropy-Scanner
# 3. Make scripts executable
chmod +x *.pyBest for quick CTF checks or when you don't have root access.
Bash
python3 Syntropy_scanner.py <TARGET_IP>
Includes the Dashboard, OS Detection, and the optional UDP Scan module. Requires Sudo.
Bash
sudo python3 Syntropy_Scanner_Ultimate.py <TARGET_IP>
For every scan, a timestamped folder is created containing:
-
*_report.html- The dark-mode HTML report. -
*_scan.xml- XML format for importing into Metasploit/Faraday. -
*_scan.nmap- Raw grepable output.
Built with π by Syntropy Security.