The Firewall Evasion Packet Tester is a CLI-based security analysis tool built using Python and Scapy. It evaluates firewall configurations by sending multiple crafted packet types to a specified target IP address. The tool determines which packets are permitted, identifies open ports, and generates a detailed summary report in a separate output file.
- Sends multiple packet types (TCP, UDP, ICMP, SYN, ACK, etc.)
- Identifies firewall-allowed packets
- Detects open and responsive ports
- Generates structured output report
- Command-line based execution
- Lightweight and customizable
- Programming Language: Python
- Networking Library: Scapy
# Clone the repository
git clone https://github.com/Bharathkumar-2006/Firewall-Analysis-tool.git
# Navigate into the project directory
cd Firewall-Analysis-tool
# Install required dependency
pip install scapy
# Run this tool
python main.py <target_ip>