DEV Community

Cover image for LANimals: Lightweight Open‑Source LAN toolkit for Hackers
GnomeMan4201
GnomeMan4201

Posted on

LANimals: Lightweight Open‑Source LAN toolkit for Hackers

A Practical LAN Discovery & Auditing Toolkit

I got tired of clunky, overbuilt network tools. So I built my own.

LANimals is a terminal-first toolkit for network discovery, mapping, and anomaly detection on local networks. I wrote it for hackers and sysadmins who want more signal, less noise.


Why Another Network Tool?

Existing options (Nmap, Angry IP, etc.) are solid, but too heavy for quick situational awareness. LANimals is modular, fast, and covers more than just scanning:

Recon

Live traffic mapping

Rogue device & dark web detection

Automated anomaly detection

All CLI. No bloat.


Key Commands

Recon: lanimals_recon for mapping devices, lanimals_viznet for visualization.

Security: lanimals_fortress for basic hardening, lanimals_roguescan for unauthorized hosts, lanimals_darkwebhost for outbound dark web sniffing.

Analytics: Log and summarize with lanimals_lootlog and lanimals_lootsummary.

Full feature rundown in the image above or the GitHub README.


Quick Start

git clone https://github.com/GnomeMan4201/LANimals.git
cd LANimals
./install.sh
lanimals_dash

No dependencies outside standard Python libs. Works on any Linux (Ubuntu/Arch tested).
Contributions for Mac/WSL welcome.


Real-World Usage

I use this daily for:

Auditing home and office LANs

Spotting rogue/unexpected hosts

Tracking device drift and traffic anomalies

It’s built for practical, not theoretical, problems.


Roadmap & Contributions

This is v1.0. Still improving detection logic and adding more protocol support.
Open to feedback, PRs, or feature requests. File an issue or hit me up.


Repo: github.com/GnomeMan4201/LANimals


No marketing. No fake promises. Just a tool I needed. Maybe you do too

Top comments (0)