| Crates.io | ipcrawler |
| lib.rs | ipcrawler |
| version | 0.1.1 |
| created_at | 2025-10-10 15:43:14.033188+00 |
| updated_at | 2025-10-10 15:43:14.033188+00 |
| description | Intelligent automated penetration testing scanner with AI-powered output parsing |
| homepage | https://github.com/neur0map/ipcrawler |
| repository | https://github.com/neur0map/ipcrawler |
| max_upload_size | |
| id | 1877107 |
| size | 293,076 |
AI-powered penetration testing scanner with concurrent execution
Runs security tools concurrently, uses LLMs to parse outputs into structured JSON, and generates comprehensive reports—all through simple YAML templates.
ipcrawler 192.168.1.1 -o ./scan
[!NOTE] LLMs are used solely to parse raw tool outputs into structured data. They do not provide security analysis, opinions, or recommendations—only data transformation from unstructured to structured format.
# Quick install
curl -fsSL https://raw.githubusercontent.com/neur0map/ipcrawler/main/install.sh | bash
# Build from source
git clone https://github.com/neur0map/ipcrawler.git
cd ipcrawler
cargo build --release
sudo mv target/release/ipcrawler /usr/local/bin/
# 1. Configure LLM provider (one-time)
ipcrawler setup
# 2. Run scan
ipcrawler example.com -o ./scan
# 3. View results
open ./scan/report.html
# Basic scan
ipcrawler <target> -o <output_dir>
# Specific ports
ipcrawler <target> -p 22,80,443 -o <output>
# Custom wordlist
ipcrawler <target> -w big -o <output>
# With sudo (privileged templates)
sudo ipcrawler <target> -o <output>
# List available templates
ipcrawler list
Get an API key from Groq (recommended), OpenAI, Anthropic, or install Ollama for local models.
# Interactive setup
ipcrawler setup
# Or set environment variables
export LLM_PROVIDER="groq"
export LLM_API_KEY="your-key"
MIT License - see LICENSE for details
Built with Rust • Powered by AI