All Projects β†’ vesche β†’ Scanless

vesche / Scanless

Licence: unlicense
online port scan scraper

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Scanless

Nimscan
πŸš€ Fast Port Scanner πŸš€
Stars: ✭ 134 (-84.69%)
Mutual labels:  pentesting, port-scanner
Sandmap
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: ✭ 1,180 (+34.86%)
Mutual labels:  command-line, port-scanner
Archerysec
Centralize Vulnerability Assessment and Management for DevSecOps Team
Stars: ✭ 1,802 (+105.94%)
Mutual labels:  pentesting, scanning
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+293.03%)
Mutual labels:  pentesting, scanning
Xidel
Command line tool to download and extract data from HTML/XML pages or JSON-APIs, using CSS, XPath 3.0, XQuery 3.0, JSONiq or pattern matching. It can also create new or transformed XML/HTML/JSON documents.
Stars: ✭ 335 (-61.71%)
Mutual labels:  command-line, scraper
Cum
comic updater, mangafied
Stars: ✭ 117 (-86.63%)
Mutual labels:  command-line, scraper
Txtool
an easy pentesting tool.
Stars: ✭ 246 (-71.89%)
Mutual labels:  pentesting, scanning
Rustscan
πŸ€– The Modern Port Scanner πŸ€–
Stars: ✭ 5,218 (+496.34%)
Mutual labels:  pentesting, scanning
QuickScan
Port scanning and domain utility.
Stars: ✭ 26 (-97.03%)
Mutual labels:  pentesting, port-scanner
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-90.17%)
Mutual labels:  pentesting, scanning
Vault
swiss army knife for hackers
Stars: ✭ 346 (-60.46%)
Mutual labels:  pentesting, port-scanner
Imagescraper
βœ‚οΈ High performance, multi-threaded image scraper
Stars: ✭ 630 (-28%)
Mutual labels:  command-line, scraper
Voyages Sncf Api
A scrapy spider that scraps times and prices from Voyages Sncf. It uses scrapyrt to provide an API interface.
Stars: ✭ 7 (-99.2%)
Mutual labels:  scraper
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (-1.83%)
Mutual labels:  pentesting
Fanyi
A πŸ‡¨πŸ‡³ and πŸ‡ΊπŸ‡Έ translate tool in your command line.
Stars: ✭ 940 (+7.43%)
Mutual labels:  command-line
Turnscan.js
Scanning LAN hosts from Chrome using ICE servers
Stars: ✭ 27 (-96.91%)
Mutual labels:  port-scanner
.scripts
~/.scripts - Ready-to-Eat Command Line Scripts.
Stars: ✭ 12 (-98.63%)
Mutual labels:  command-line
Yub
yub.js - A command-line for the web
Stars: ✭ 10 (-98.86%)
Mutual labels:  command-line
Video Containers Debugging Tools
A set of command lines to debug video streaming files like mp4 (MPEG-4 Part 14), ts (MPEG-2 Part 1), fmp4 in Dash, HLS, or MSS, with or without DRM.
Stars: ✭ 27 (-96.91%)
Mutual labels:  command-line
Cve 2016 8610 Poc
CVE-2016-8610 (SSL Death Alert) PoC
Stars: ✭ 26 (-97.03%)
Mutual labels:  pentesting

scanless

This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf.

Supported Online Port Scanners

Install

Do it up:

$ pip install scanless --user

CLI Usage

$ scanless --help  
usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a]

scanless, an online port scan scraper.

optional arguments:
  -h, --help            show this help message and exit
  -v, --version         display the current version
  -t TARGET, --target TARGET
                        ip or domain to scan
  -s SCANNER, --scanner SCANNER
                        scanner to use (default: hackertarget)
  -r, --random          use a random scanner
  -l, --list            list scanners
  -a, --all             use all the scanners
  -d, --debug           debug mode (cli mode off & show network errors)

$ scanless --list
+----------------+--------------------------------------+
| Scanner Name   | Website                              |
+----------------+--------------------------------------+
| hackertarget   | https://hackertarget.com             |
| ipfingerprints | https://www.ipfingerprints.com       |
| spiderip       | https://spiderip.com                 |
| standingtech   | https://portscanner.standingtech.com |
| t1shopper      | http://www.t1shopper.com             |
| viewdns        | https://viewdns.info                 |
| yougetsignal   | https://www.yougetsignal.com         |
+----------------+--------------------------------------+

$ scanless -t scanme.nmap.org -s spiderip
Running scanless v2.1.4...

spiderip:
PORT      STATE  SERVICE
21/tcp    closed ftp
22/tcp    open   ssh
25/tcp    closed smtp
80/tcp    open   http
110/tcp   closed pop3
143/tcp   closed imap
443/tcp   closed https
465/tcp   closed smtps
993/tcp   closed imaps
995/tcp   closed pop3s
1433/tcp  closed ms-sql-s
3306/tcp  closed mysql
3389/tcp  closed ms-wbt-server
5900/tcp  closed vnc
8080/tcp  closed http-proxy
8443/tcp  closed https-alt

Library Usage

>>> import scanless
>>> sl = scanless.Scanless()
>>> output = sl.scan('scanme.nmap.org', scanner='hackertarget')
>>> print(output['raw'])
Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC
Nmap scan report for scanme.nmap.org (45.33.32.156)
Host is up (0.065s latency).
Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f

PORT    STATE  SERVICE
21/tcp  closed ftp
22/tcp  open   ssh
80/tcp  open   http
443/tcp closed https

Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
>>> import json
>>> print(json.dumps(output['parsed'], indent=2))
[
  {
    "port": "21",
    "state": "closed",
    "service": "ftp",
    "protocol": "tcp"
  },
  {
    "port": "22",
    "state": "open",
    "service": "ssh",
    "protocol": "tcp"
  },
  {
    "port": "80",
    "state": "open",
    "service": "http",
    "protocol": "tcp"
  },
  {
    "port": "443",
    "state": "closed",
    "service": "https",
    "protocol": "tcp"
  }
]

Docker

Note from the repo author: I did not create, nor do I maintain Docker support or the Dockerfile for scanless. It was a nice community addition. If it's broken please open an issue or submit a pull request and I'll take a look. Thank you!

Build

To build the Docker image, run:

$ docker build -t scanless .

Usage

To use the Docker image previously created, run the following with whichever options you want like --help:

$ docker run --rm -it scanless --help

If that long command is too troublesome, you can make an alias like so: alias scanless="docker run --rm -it scanless" and then run scanless as you would normally:

$ scanless --help
$ scanless -l
$ scanless -t scanme.nmap.org -s yougetsignal
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].