/// LEAVE NO STONE UNTURNED ///
You are in a CTF or a Pentest. You run a standard nmap scan. It checks the top 1,000 ports. You see port 80 and 445. You attack them for 3 hours and get nowhere.
The Reality: The target had a hidden administrative console on Port 6520. Nmap missed it. You missed the shell.
Syntropy Scanner automates the "Discovery" phase of a penetration test. It runs two scans simultaneously (Fast Nmap + Full Rustscan) and performs a Gap Analysis. If Rustscan finds a port that Nmap missed, it triggers a RED ALERT. It ends with producing a clean HTML report of the entire comprehensive scan on the target.
| Feature | 🟢 Standard Edition (Syntropy_scanner.py) |
🔴 Ultimate Edition (Syntropy_Scanner_Ultimate.py) |
|---|---|---|
| Speed | ⚡ Instant | 🐢 Slower (Deep Analysis) |
| Gap Analysis | ✅ Yes | ✅ Yes |
| Visual Dashboard | ✅ HTML report | ✅ HTML report |
| UDP Support | ❌ No | ✅ Optional Module |
| Root Required | ❌ No | ✅ Yes (For UDP/OS Detect) |
Don't just stare at terminal output. Syntropy generates clean HTML report for every scan—perfect for documentation on pentest reports.
Prerequisites:
python3nmaprustscan(Install Guide)xsltproc(Required for HTML reports:sudo apt install xsltproc)
# 1. Clone the repository
# 2. Enter directory
cd Syntropy-Scanner
# 3. Make scripts executable
chmod +x *.pyBest for quick CTF checks or when you don't have root access.
Bash
python3 Syntropy_scanner.py <TARGET_IP>
Includes the Dashboard, OS Detection, and the optional UDP Scan module. Requires Sudo.
Bash
sudo python3 Syntropy_Scanner_Ultimate.py <TARGET_IP>
For every scan, a timestamped folder is created containing:
-
*_report.html- The dark-mode HTML report. -
*_scan.xml- XML format for importing into Metasploit/Faraday. -
*_scan.nmap- Raw grepable output.
Built with 💀 by Syntropy Security.