vesche / Scanless
Licence: unlicense
online port scan scraper
Stars: β 875
Programming Languages
python
139335 projects - #7 most used programming language
Projects that are alternatives of or similar to Scanless
Sandmap
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Stars: β 1,180 (+34.86%)
Mutual labels: command-line, port-scanner
Archerysec
Centralize Vulnerability Assessment and Management for DevSecOps Team
Stars: β 1,802 (+105.94%)
Mutual labels: pentesting, scanning
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance withβ¦
Stars: β 3,439 (+293.03%)
Mutual labels: pentesting, scanning
Xidel
Command line tool to download and extract data from HTML/XML pages or JSON-APIs, using CSS, XPath 3.0, XQuery 3.0, JSONiq or pattern matching. It can also create new or transformed XML/HTML/JSON documents.
Stars: β 335 (-61.71%)
Mutual labels: command-line, scraper
Rustscan
π€ The Modern Port Scanner π€
Stars: β 5,218 (+496.34%)
Mutual labels: pentesting, scanning
QuickScan
Port scanning and domain utility.
Stars: β 26 (-97.03%)
Mutual labels: pentesting, port-scanner
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: β 86 (-90.17%)
Mutual labels: pentesting, scanning
Imagescraper
βοΈ High performance, multi-threaded image scraper
Stars: β 630 (-28%)
Mutual labels: command-line, scraper
Voyages Sncf Api
A scrapy spider that scraps times and prices from Voyages Sncf. It uses scrapyrt to provide an API interface.
Stars: β 7 (-99.2%)
Mutual labels: scraper
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: β 859 (-1.83%)
Mutual labels: pentesting
Fanyi
A π¨π³ and πΊπΈ translate tool in your command line.
Stars: β 940 (+7.43%)
Mutual labels: command-line
Turnscan.js
Scanning LAN hosts from Chrome using ICE servers
Stars: β 27 (-96.91%)
Mutual labels: port-scanner
.scripts
~/.scripts - Ready-to-Eat Command Line Scripts.
Stars: β 12 (-98.63%)
Mutual labels: command-line
Video Containers Debugging Tools
A set of command lines to debug video streaming files like mp4 (MPEG-4 Part 14), ts (MPEG-2 Part 1), fmp4 in Dash, HLS, or MSS, with or without DRM.
Stars: β 27 (-96.91%)
Mutual labels: command-line
Cve 2016 8610 Poc
CVE-2016-8610 (SSL Death Alert) PoC
Stars: β 26 (-97.03%)
Mutual labels: pentesting
scanless
This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf.
Supported Online Port Scanners
Install
Do it up:
$ pip install scanless --user
CLI Usage
$ scanless --help
usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a]
scanless, an online port scan scraper.
optional arguments:
-h, --help show this help message and exit
-v, --version display the current version
-t TARGET, --target TARGET
ip or domain to scan
-s SCANNER, --scanner SCANNER
scanner to use (default: hackertarget)
-r, --random use a random scanner
-l, --list list scanners
-a, --all use all the scanners
-d, --debug debug mode (cli mode off & show network errors)
$ scanless --list
+----------------+--------------------------------------+
| Scanner Name | Website |
+----------------+--------------------------------------+
| hackertarget | https://hackertarget.com |
| ipfingerprints | https://www.ipfingerprints.com |
| spiderip | https://spiderip.com |
| standingtech | https://portscanner.standingtech.com |
| t1shopper | http://www.t1shopper.com |
| viewdns | https://viewdns.info |
| yougetsignal | https://www.yougetsignal.com |
+----------------+--------------------------------------+
$ scanless -t scanme.nmap.org -s spiderip
Running scanless v2.1.4...
spiderip:
PORT STATE SERVICE
21/tcp closed ftp
22/tcp open ssh
25/tcp closed smtp
80/tcp open http
110/tcp closed pop3
143/tcp closed imap
443/tcp closed https
465/tcp closed smtps
993/tcp closed imaps
995/tcp closed pop3s
1433/tcp closed ms-sql-s
3306/tcp closed mysql
3389/tcp closed ms-wbt-server
5900/tcp closed vnc
8080/tcp closed http-proxy
8443/tcp closed https-alt
Library Usage
>>> import scanless
>>> sl = scanless.Scanless()
>>> output = sl.scan('scanme.nmap.org', scanner='hackertarget')
>>> print(output['raw'])
Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC
Nmap scan report for scanme.nmap.org (45.33.32.156)
Host is up (0.065s latency).
Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
PORT STATE SERVICE
21/tcp closed ftp
22/tcp open ssh
80/tcp open http
443/tcp closed https
Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds
>>> import json
>>> print(json.dumps(output['parsed'], indent=2))
[
{
"port": "21",
"state": "closed",
"service": "ftp",
"protocol": "tcp"
},
{
"port": "22",
"state": "open",
"service": "ssh",
"protocol": "tcp"
},
{
"port": "80",
"state": "open",
"service": "http",
"protocol": "tcp"
},
{
"port": "443",
"state": "closed",
"service": "https",
"protocol": "tcp"
}
]
Docker
Note from the repo author: I did not create, nor do I maintain Docker support or the Dockerfile for scanless. It was a nice community addition. If it's broken please open an issue or submit a pull request and I'll take a look. Thank you!
Build
To build the Docker image, run:
$ docker build -t scanless .
Usage
To use the Docker image previously created, run the following with whichever options you want like --help
:
$ docker run --rm -it scanless --help
If that long command is too troublesome, you can make an alias like so: alias scanless="docker run --rm -it scanless"
and then run scanless
as you would normally:
$ scanless --help
$ scanless -l
$ scanless -t scanme.nmap.org -s yougetsignal
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].