Scanning and capture
Uses scapy, socket, and subprocess to gather interface information.
A modular toolkit that tests, analyses, and strengthens Wi-Fi networks with clear flows for scanning, assessment, and report generation.
NSA was created to professionalise home security tests, offering clear, documented scripts that any cybersecurity enthusiast can extend.
Networking libraries and report generation form the core of the toolkit, keeping the setup lean and portable.
Uses scapy, socket, and subprocess to gather interface information.
Customisable rules to verify encryption types, default passwords, and protection best practices.
Generates friendly reports with pandas, jinja2, or reportlab depending on the flow.
Clear separation between collection, analysis, reporting, and profile management avoids tight coupling and enables isolated tests.
NSA/
โโโ scan_wifi_networks.py # Available network scanning
โโโ sec_analysis.py # Security evaluation rules
โโโ sec_report.py # Detailed report generation
โโโ wifi_profile.py # Wi-Fi profile CRUD
Run the scripts on machines that support monitor mode and have the required privileges. Tests were validated on Debian-based Linux distributions.
git clone https://github.com/eduardo45MP/NSA.git
cd NSA
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt # when available
sudo apt install aircrack-ng net-tools wireless-tools
sudo python scan_wifi_networks.py
python sec_analysis.py
python sec_report.py
Adjust commands for your environment and ensure write permissions on output directories when generating reports.
Contributors can expand security rules, report formats, and support for new platforms.
Add advanced checks to detect frequent insecure configurations.
Create customisable layouts with charts, checklists, and audience-specific guidance.
Implement unit tests and mocks to simulate results without real hardware access.
Before contributing, read the legal notice in the README and keep the visual identity aligned with the guides in portfolio/docs/.
This toolkit is intended exclusively for authorised environments. Never use it without consent; responsibility lies fully with the user.