ptrrkssn / pnscan
Licence: BSD-3-Clause license
Peter's Parallel Network Scanner
Stars: ✭ 117
Programming Languages
Projects that are alternatives of or similar to pnscan
CleanSCAN
A simple, smart and efficient document scanner for Android
Stars: ✭ 151 (+29.06%)
Mutual labels: scanner
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+308.55%)
Mutual labels: scanner
polscan
Zero-setup SSH-based scanner with extensive visualizations for Debian server inventory, policy compliance and vulnerabilities
Stars: ✭ 57 (-51.28%)
Mutual labels: scanner
moneta
Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (+228.21%)
Mutual labels: scanner
Jira-Lens
Fast and customizable vulnerability scanner For JIRA written in Python
Stars: ✭ 185 (+58.12%)
Mutual labels: scanner
sgCheckup
sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Stars: ✭ 77 (-34.19%)
Mutual labels: scanner
DNTScanner.Core
DNTScanner.Core is a .NET 4x and .NET Core 2x+ wrapper for the Windows Image Acquisition library.
Stars: ✭ 54 (-53.85%)
Mutual labels: scanner
nmap-formatter
A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot). Simply put it's nmap converter.
Stars: ✭ 129 (+10.26%)
Mutual labels: scanner
PSMemory
Automation Capable Multi Search 64 Bit Windows Memory Scanner
Stars: ✭ 25 (-78.63%)
Mutual labels: scanner
ioc-scanner
Search a filesystem for indicators of compromise (IoC).
Stars: ✭ 31 (-73.5%)
Mutual labels: scanner
scanbot-sdk-example-ios
No description or website provided.
Stars: ✭ 17 (-85.47%)
Mutual labels: scanner
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+21.37%)
Mutual labels: scanner
memory signature
A small wrapper class providing an unified interface to search for various memory signatures
Stars: ✭ 69 (-41.03%)
Mutual labels: scanner
flex-bison-indentation
An example of how to correctly parse python-like indentation-scoped files using flex (and bison).
Stars: ✭ 32 (-72.65%)
Mutual labels: scanner
pnscan - a Parallel Network Scanner Copyright (c) 2002-2020 Peter Eriksson <[email protected]> ---------------------------------------------------------------------- INTRODUCTION Pnscan is a tool that can be used to survey IPv4 TCP network services. IPv6 is currently not supported. For example, it can be used to survey the installed versions of SSH, FTP, SMTP, Web, IDENT and possibly other services. The latest version of pnscan can be downloaded from: https://github.com/ptrrkssn/pnscan There is also a small web page about it at: http://www.lysator.liu.se/~pen/pnscan If you like it then I'd gladly accept a nice bottle of whisky, some free beer or even just a "Thank you!" email :-) INSTALLATION Run "./configure && make" to configure & build. "make install" will install. FreeBSD 11.3 & 12.0 Ubuntu 20 CentOS 6 & 8 OmniOS r151034 Solaris 10 (requires a GCC that understands -pthread, v5 works) When it has been built you can install it with "make install-all". It will by default install in /usr/local/bin and /usr/local/man/man1 (Solaris 10 - Sun Studio 12.4 can be used to compile if you edit Makefile.in and change -pthread to -thread and remove -Wall before running ./configure) There is support for various package systems (FreeBSD ports, Linux RPM, MacOS HomeBrew, Solaris "svr" packages and OmniOS Extra IPS) in the "pkgs" subdirectory. See the pkgs/Makefile for details. USAGE Start pnscan with "-h" for online help. pnscan tries to be smart as to how many threads to start - it will dynamically start only as many as is needed to make progress in the scan - up to a maximum either as specified with the "-n" command line option, or 8 minus the maximum number of available file descriptors (pnscan tries to increase it to the max limit automatically) - or any internal limit on the system. Host ranges can be specified both as a CIDR - network name or IP address / mask bit length and as a range. When using CIDR notation - the first and last address is ignored (normally used for broadcasts) Some examples: 192.168.0.0/24 192.160.0.1:192.160.0.254 arpanet/8 The CIDR names are looked up in "networks" (/etc/networks or the YP/NIS+/whatever equivalent). The host ranges can also be specified as a range (or a single address) of hostnames or IP addresses: some.where.com:otherplace.where.com 192.168.10.27:192.168.11.194 localhost Service/Port ranges can be specified both via symbolic names looked up in "services" (/etc/services or YP/NIS+/whatever equivalent) or as numbers: ssh:telnet 22:23 113 The strings used with "-w" and "-r" may contain escaped characters. NUL characters are legal (\0) to use. pnscan by default will start printing the output from the first line recevied - *or* from the start of a match with "-r" (or from the first line of the first match if used with the "-l" option). EXAMPLES # Scan network 192.168.0.0/24 for SSH daemons on port 22 pnscan 192.168.0.0/24 22 pnscan 192.168.0.1:192.168.0.254 ssh # Scan hosts 192.168.10.34 ... 98 for IDENT servers, max 8 threads pnscan -n8 -w"VERSION" 192.168.10.34:192.168.10.98 113 # Scan host 127.0.0.1 for WWW servers on all ports pnscan -w"HEAD / HTTP/1.0\r\n\r\n" -r"Server:" 192.168.0.32 1:65525 pnscan -w"HEAD / HTTP/1.0\r\n\r\n" -r"Server:" localhost 1:65525 # Send binary data and expect the binary sequence FF 00 FF on port 145. pnscan -W"05 5A 37" -R"FF 00 FF" 192.168.0.32 145 # Scan for Roxen servers and print the whole Server-line pnscan -l -w"HEAD / HTTP/1.0\r\n\r\n" -r"Roxen" localhost 1:65525 # Scan for pidentd servers and try to locate the version pnscan -w"VERSION" 192.160.0.0/24 113 # Scan network arpanet/24 for daytime servers and sort them IP-numerically pnscan arpanet/10 daytime | ipsort # Read host (&port) lines from stdin and scan the selected hosts for SSH echo '192.160.10.11 ssh' | pnscan -v echo '192.160.10.12' | pnscan 22 WARNING Scanning of networks of which you do not have explicit permission to do probably _will_ be considered abuse of network resources and may cause problems for you. So *please* use this tool with great care.
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].