A Practical LAN Discovery & Auditing Toolkit
I got tired of clunky, overbuilt network tools. So I built my own.
LANimals is a terminal-first toolkit for network discovery, mapping, and anomaly detection on local networks. I wrote it for hackers and sysadmins who want more signal, less noise.
Why Another Network Tool?
Existing options (Nmap, Angry IP, etc.) are solid, but too heavy for quick situational awareness. LANimals is modular, fast, and covers more than just scanning:
Recon
Live traffic mapping
Rogue device & dark web detection
Automated anomaly detection
All CLI. No bloat.
Key Commands
Recon: lanimals_recon for mapping devices, lanimals_viznet for visualization.
Security: lanimals_fortress for basic hardening, lanimals_roguescan for unauthorized hosts, lanimals_darkwebhost for outbound dark web sniffing.
Analytics: Log and summarize with lanimals_lootlog and lanimals_lootsummary.
Full feature rundown in the image above or the GitHub README.
Quick Start
git clone https://github.com/GnomeMan4201/LANimals.git
cd LANimals
./install.sh
lanimals_dash
No dependencies outside standard Python libs. Works on any Linux (Ubuntu/Arch tested).
Contributions for Mac/WSL welcome.
Real-World Usage
I use this daily for:
Auditing home and office LANs
Spotting rogue/unexpected hosts
Tracking device drift and traffic anomalies
It’s built for practical, not theoretical, problems.
Roadmap & Contributions
This is v1.0. Still improving detection logic and adding more protocol support.
Open to feedback, PRs, or feature requests. File an issue or hit me up.
Repo: github.com/GnomeMan4201/LANimals
No marketing. No fake promises. Just a tool I needed. Maybe you do too
Top comments (0)