FindWall is Python script that allows to understand if your network provider is limiting your access to the Internet by blocking any TCP/UDP port. In order to perform this check FindWall needs to connect a public VPS of your property. FindWall performs the following actions:
To use FindWall you just need an account on a public VPS. The account must have root access if you want to test ports in the range 1-1024
. The root account is also required to automatically install the tool nc
to open ports.
$ pip install -r requirements
$ python findwall.py –help
███████╗██╗███╗ ██╗██████╗ ██╗ ██╗ █████╗ ██╗ ██╗
██╔════╝██║████╗ ██║██╔══██╗██║ ██║██╔══██╗██║ ██║
█████╗ ██║██╔██╗ ██║██║ ██║██║ █╗ ██║███████║██║ ██║
██╔══╝ ██║██║╚██╗██║██║ ██║██║███╗██║██╔══██║██║ ██║
██║ ██║██║ ╚████║██████╔╝╚███╔███╔╝██║ ██║███████╗███████╗
╚═╝ ╚═╝╚═╝ ╚═══╝╚═════╝ ╚══╝╚══╝ ╚═╝ ╚═╝╚══════╝╚══════
usage: findwall.py [-h] –ssh-host SSH_HOST [–ssh-port SSH_PORT] –ssh-username SSH_USERNAME [–ssh-password SSH_PASSWORD] [–ask-ssh-pass] [–ssh-key SSH_KEY] –ports PORTS [–udp]
[–threads THREADS]
Check if someone is blocking you!
optional arguments:
-h, –help show this help message and exit
–ssh-host SSH_HOST Remote host
–ssh-port SSH_PORT Remote SSH port
–ssh-username SSH_USERNAME
Remote SSH username
–ssh-password SSH_PASSWORD
Remote SSH password
–ask-ssh-pass Ask for remote SSH password
–ssh-key SSH_KEY Remote SSH private key
–ports PORTS Port range to scan (default: 1-1024)
–udp Scan in UDP
–threads THREADS Number of threads (default: 1)
As an example:
$ python findwall.py –ssh-host 172.17.0.2 –ssh-port 22 –ssh-username test –ssh-password test –ports 8000-8010 –threads 3
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…