AI-Powered Local Network Scanner – Flutter App
Zentry is an innovative mobile application focused on cybersecurity, developed with Flutter. It allows users to scan and evaluate their local networks with AI-powered intelligent analysis.
-
🔍 Local Network Scanning Detects all connected devices and open ports in the local network.
-
🛰️ Packet Sniffing Captures and analyzes network packets to give deeper insights into network traffic.
-
🧠 AI Evaluation Uses artificial intelligence to analyze network structure, detect vulnerabilities, and provide improvement suggestions.
-
🌐 Flutter Multiplatform Developed with Flutter for a seamless experience on Android & iOS.
- Flutter
- Dart (Primary language)
- Platform Channels for native integration (Android/iOS)
- BLoC for state management
- Custom libraries for network scanning and analysis
- Integration with external AI for evaluation and recommendations
To build locally, you'll first need to configure your Gemini API key.
- Get your Gemini API Key:
- Go to Google AI Studio and generate a new API key.
- Add the key to your project:
- Rename the
dotenv.examplefile in the project's root directory to.env. - Open the newly renamed
.envfile and replaceYOUR_API_KEY_HEREwith your actual key:GEMINI_API_KEY=YOUR_API_KEY_HERE - The
.envfile is excluded from version control for security.
After setting up your API key, you can build the project:
git clone https://github.com/AdrianLeyva/zentry.git
cd zentry
flutter pub get
flutter buildThe use of Zentry is intended exclusively for personal security and analysis of local networks that you own or for which you have explicit permission.
- Consent: Always obtain explicit permission before scanning or analyzing a network that is not your own.
- Responsibility: You are solely responsible for your actions when using this application. Use Zentry ethically and legally.
The use of network security tools in unauthorized environments is illegal in many jurisdictions and may result in civil and criminal penalties. Zentry is designed for the auditing of authorized home and business networks and should not be used for ethical or black-box hacking without the network owner's consent.
By using Zentry, you accept these terms and agree to use the application responsibly and in compliance with the law.


