{"id":15130439,"url":"https://github.com/adminisme/serverscan","last_synced_at":"2025-04-08T09:06:43.052Z","repository":{"id":37281444,"uuid":"252767566","full_name":"Adminisme/ServerScan","owner":"Adminisme","description":"ServerScan一款使用Golang开发的高并发网络扫描、服务探测工具。","archived":false,"fork":false,"pushed_at":"2024-06-16T13:41:34.000Z","size":21236,"stargazers_count":1592,"open_issues_count":4,"forks_count":221,"subscribers_count":32,"default_branch":"master","last_synced_at":"2025-04-08T09:06:33.356Z","etag":null,"topics":["cobalt-strike","golang","linux","macos","nmap","pentest-tool","port-scanner-in-go","security-scanner","serverscan","service-discovery","win"],"latest_commit_sha":null,"homepage":"https://github.com/Adminisme/ServerScan","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Adminisme.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2020-04-03T15:14:12.000Z","updated_at":"2025-04-03T07:09:56.000Z","dependencies_parsed_at":"2024-11-19T08:42:05.774Z","dependency_job_id":null,"html_url":"https://github.com/Adminisme/ServerScan","commit_stats":null,"previous_names":[],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Adminisme%2FServerScan","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Adminisme%2FServerScan/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Adminisme%2FServerScan/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Adminisme%2FServerScan/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Adminisme","download_url":"https://codeload.github.com/Adminisme/ServerScan/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247809964,"owners_count":20999816,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cobalt-strike","golang","linux","macos","nmap","pentest-tool","port-scanner-in-go","security-scanner","serverscan","service-discovery","win"],"created_at":"2024-09-26T02:47:33.635Z","updated_at":"2025-04-08T09:06:43.010Z","avatar_url":"https://github.com/Adminisme.png","language":"Go","readme":"# ServerScan\n\n![Author](https://img.shields.io/badge/Author-Trim-blueviolet)  ![Bin](https://img.shields.io/badge/servercan-Bin-ff69b4)  ![build](https://img.shields.io/badge/build-passing-green.svg)  ![](https://img.shields.io/badge/language-golang-blue.svg)\n\n\n```shell\n███████╗███████╗██████╗ ██╗   ██╗███████╗██████╗     ███████╗ ██████╗ █████╗ ███╗   ██╗\n██╔════╝██╔════╝██╔══██╗██║   ██║██╔════╝██╔══██╗    ██╔════╝██╔════╝██╔══██╗████╗  ██║\n███████╗█████╗  ██████╔╝██║   ██║█████╗  ██████╔╝    ███████╗██║     ███████║██╔██╗ ██║\n╚════██║██╔══╝  ██╔══██╗╚██╗ ██╔╝██╔══╝  ██╔══██╗    ╚════██║██║     ██╔══██║██║╚██╗██║\n███████║███████╗██║  ██║ ╚████╔╝ ███████╗██║  ██║    ███████║╚██████╗██║  ██║██║ ╚████║\n╚══════╝╚══════╝╚═╝  ╚═╝  ╚═══╝  ╚══════╝╚═╝  ╚═╝    ╚══════╝ ╚═════╝╚═╝  ╚═╝╚═╝  ╚═══╝\n                                                                                By:Trim   \n```\n\n一款使用**Golang**开发且适用于攻防演习**内网横向信息收集**的**高并发**网络扫描、服务探测工具。\n\n## 🍭Property\n- 多平台支持（Windows、Mac、Linux、Cobalt Strike）\n- 存活IP探测（支持TCP、ICMP两种模式）\n- 超快的端口扫描\n- 服务和应用版本检测功能，内置指纹探针采用:[nmap-service-probes](https://raw.githubusercontent.com/nmap/nmap/master/nmap-service-probes)\n- Web服务（http、https）信息探测\n- ~~扫描结果兼容INFINITY攻防协同平台~~（暂不公开）\n\n## 🎉First Game\n\n​\t总结诸多实战经验，考虑到实战过程中会出现和存在复杂的环境、红蓝对抗过程中常用的内存加载无文件落地执行等，因此**ServerScan**设计了**轻巧版**、**专业版**、支持**Cobalt Strike跨平台beacon:[Cross C2](https://github.com/gloxec/CrossC2)的动态链接库**，**~~以及支持INFINITY攻防协同平台的专用版~~**。便于在不同的Shell环境中可以轻松自如地使用：如：Windows Cmd、Linux Console、远控Console、WebShell等，以及Cobalt Strike联动使用cna脚本文件加载，实现内网信息快速收集，为下一步横向移动铺路。\n\n**轻巧版：**\n\n 参数形式简单、扫描速度快、耗时短、文件体积小、适合在网络情况较好的条件情况下使用。\n\n**专业版：**\n\n 支持参数默认值、支持自定义扫描超时时长、支持扫描结果导出、适合在网络条件较苛刻的情况下使用。\n\n**动态链接库：**\n\n 为支持Cobalt Strike跨平台beacon，无文件落地执行，无文件执行的进程信息，基于轻巧版本进行动态链接库编译，扫描超时时长为1.5秒。\n\n### 💻for  Linux or Windows\n\n  * #### 轻巧版\n  \n    * ***for PortScan***\n    \n      **Usage：**\n    \n      ![Air_scan_use](./img/serverscan/Linux/Air_scan_use.png)\n    \n      **Scanning：**\n    \n      ![Air_scan1](./img/serverscan/Linux/Air_scan.png)\n    \n    * ***for Service and Version Detection***\n    \n      **Usage：**\n    \n      ![Air_scan_probes_use](./img/serverscan/Windows/Air_scan_probes_use.png)\n    \n      **Scanning：**\n    \n      ![Air_scan_probes](./img/serverscan/Windows/Air_scan_probes.png)\n  \n  * #### 专业版\n\n    * ***for PortScan***\n\n      **Usage：**\n\n      ![Pro_scan_use](./img/serverscan/Linux/Pro_scan_use.png)\n\n      **Scanning：**\n    \n      ![Pro_scan](./img/serverscan/Linux/Pro_scan.png)\n    \n    * ***for Service and Version Detection***\n    \n      **Usage：**\n    \n      ![Pro_scan_probes_use](./img/serverscan/Windows/Pro_scan_probes_use.png)\n    \n      **Scanning：**\n    \n      ![Pro_scan_probes](./img/serverscan/Windows/Pro_scan_probes.png)\n\n \n\n### 🎮for Cobalt Strike\n\n  * ***Windows***\n\n       \t由于Cobalt Strike已经内置了PortScan，因此目前Windows仅支持利用cna上传对应版本的ServerScan可执行文件到服务器进行扫描。\n\n      * ***for Service and Version Detection***\n\n        Interact:\n\n        ![serverscan_windows](./img/serverscan/CobaltStrike/serverscan_windows.jpg)\n\n        ![serverscan2_windows](./img/serverscan/CobaltStrike/serverscan2_windows.jpg)\n\n\n  * ***Cobalt Strike跨平台beacon***\n\n    ​        ServerScan的优势在于跨平台，在Hook师傅的帮（jiān）助（dū）下目前已经基本适配了[Cross C2](https://github.com/gloxec/CrossC2)的Linux、Mac OS两大平台，为了提高隐匿性减少文件特征，目前支持内存加载可执行程序和动态链接库调用，您只需在安装了Cross C2的Cobalt Strike中导入对应的.cna脚本，即可实现ServerScan与Cobalt Strike跨平台beacon联动，具体使用参考[Usage](#usage)。\n\n      * ***for PortScan***\n\n        Interact:\n\n        ![portscan_console](./img/serverscan/CobaltStrike/portscan_console.jpg)\n\n        Targets结果集自动导入:\n\n        ![portscan_targets](./img/serverscan/CobaltStrike/portscan_targets.jpg)\n\n        services结果集自动导入:\n\n        ![portscan_services](./img/serverscan/CobaltStrike/portscan_services.jpg)\n\n      * ***for Service and Version Detection***\n\n        Interact:\n\n        ![serverscan_console](./img/serverscan/CobaltStrike/serverscan_console.png)\n\n        Targets结果集自动导入:\n\n        ![serverscan_targets](./img/serverscan/CobaltStrike/serverscan_targets.jpg)\n\n        services结果集自动导入:\n\n        ![serverscan_services](./img/serverscan/CobaltStrike/serverscan_services.jpg)\n\n\n\n## 🌈Runtime Environment\n\n为了实现“**一次开发，到处运行**”的效果，**ServerScan**采用具有跨平台编译特性的**Golang**进行开发。\n\n目前已成功编译了**三大主流操作系统**的**可执行程序**和**动态链接库**，并在如下操作系统**通过**了运行测试：\n\n#### 📺Windows\n\n- **Windows 2003**\n  - [x] **x86**\n\n- **Windows 2008 server 、Windows 2012  server 、Windows 7 、Windows  10**\n  - [x] **x86**\n  - [x] **x64**\n  - [x] **.dll**\n\n#### 🐧Linux\n- **Ubuntu 、Centos、Kali**\n  - [x] **x86**\n  - [x] **x64**\n  - [x] **.so**\n\n#### 🍎Mac OS\n  - [x] **x64**\n  - [x] **.dylib**\n\n\n## 🐱‍👓Usage\n\n* **轻巧版**\n\n  ```shell\n  HOST  Host to be scanned, supports four formats:\n      192.168.1.1\n      192.168.1.1-10\n      192.168.1.*\n      192.168.1.0/24\n  PORT  Customize port list, separate with ',' example: 21,22,80-99,8000-8080 ...\n  MODEL Scan Model: icmp or tcp\n  ```\n\n* **专业版**\n\n    ```shell\n      -h string\n        \tHost to be scanned, supports four formats:\n        \t192.168.1.1\n        \t192.168.1.1-10\n        \t192.168.1.*\n        \t192.168.1.0/24.\n      -m string\n        \tScan Model icmp or tcp. (default \"icmp\")\n      -o string\n        \tOutput the scanning information to file.\n      -p string\n        \tCustomize port list, separate with ',' example: 21,22,80-99,8000-8080 ... (default \"80-99,7000-9000,9001-9999,4430,1433,1521,3306,5000,5432,6379,21,22,100-500,873,4440,6082,3389,5560,5900-5909,1080,1900,10809,50030,50050,50070\")\n      -t int\n        \tSetting scaner connection timeouts,Maxtime 30 Second. (default 2)\n      -v\tServerScan Build Version\n    ```\n\n* **Cobalt Strike版本**\n\n  ```shell\n  ├─ServerScanForLinux\n  │  │  CrossC2Kit.cna\n  │  │  serverscan.linux.elf.cna\n  │  │  serverscan.linux.so.cna\n  │  │\n  │  ├─ELF\n  │  │      portscan\n  │  │      portscan386\n  │  │      serverscan\n  │  │      serverscan386\n  │  │\n  │  └─SO\n  │          crossc2_portscan.so\n  │          crossc2_serverscan.so\n  │\n  └─ServerScanForWindows\n      │  serverScan.win.cna\n      │\n      └─PE\n          ├─x64\n          │      serverscan_amd64.exe\n          │\n          └─x86\n                  serverscan_386.exe\n  ```\n\n  * ***Windows***\n\n   \t在Cobalt Strike的Script Manager中***Load*** serverScan.win.cna\n\n  （Ps：serverScan.win.cna主要是通过将本地对应版本的Serverscan上传到服务器的c:\\\\windows\\\\temp\\目录执行，此方法略显笨拙，后期会更新无文件落地的方法）\n\n  ![scriptManager_win](./img/serverscan/Usage/scriptManager_win.png)\n\n   \t 选择一个已经上线的beacon,在Interact中输入help查看Commands是否新增了Serverscan86、Serverscan64，若出现就可以像使用portscan一样使用serverscan了🙂\n\n  ![windows_help](./img/serverscan/Usage/windows_help.jpg)\n\n  ![windows_usage](./img/serverscan/Usage/windows_usage.jpg)\n\n  * ***Cobalt Strike跨平台beacon***\n\n  ​     首先您应该确保已经在Cobalt Strike成功安装了[Cross C2](https://github.com/gloxec/CrossC2)；\n\n  ​\t其次在Cobalt Strike的Script Manager中 ***Load*** serverscan.linux.elf.cna 和  serverscan.linux.so.cna两个脚本，其分别对应内存加载ELF、动态链接库so调用，两者的区别主要是隐匿性的问题😎\n\n  ​\t若直接调用so文件运行serverscan时，在主机上ps无法找到对应的进程，而直接内存加载serverscan的ELF则会在运行过程中出现一个随机名称的扫描进程🙃\n\n  （目前带有指纹识别的动态链接库编译的文件体积较大，还没有找到合适的办法压缩体积，各位师傅们有好的提议欢迎issue）🔥🔥🔥\n\n  ![scriptManager_linux](./img/serverscan/Usage/scriptManager_linux.png)\n\n​\t\t![linux_help](./img/serverscan/Usage/linux_help.jpg)\n\n![linux_usage](./img/serverscan/Usage/linux_usage.jpg)\n\n* **INFINITY攻防协同平台版本**\n\n   ~~（暂不公开）~~\n\n\n## 🎁支持ServerScan\n\n如果您认为ServerScan帮助到了您，可使用微信扫一扫下方的**赞赏码**，支持作者继续**改进**和**优化**ServerScan。\n\n\u003cimg src=\"./img/serverscan/thankyou.jpg\" alt=\"thankyou\" style=\"zoom: 33%;\" /\u003e\n\n\n## 🧐问题反馈\n\n\u003e 💌：trim@venomsec.org\n\n\n\n## 💖鸣谢\n\n一路走来，得到了很多前辈的帮助和指导，在此表示衷心的感谢！\n\n下列是本项目使用或者参考的优秀开源框架，感谢网上众多的开源项目及其开源项目的作者，致敬为网络安全事业做出贡献的每一位前辈！\n\n* [httpscan](https://github.com/soxfmr/httpscan.go) - httpscan implements by Go\n* [iprange](https://github.com/malfunkt/iprange) - IPv4 address parser for the nmap format\n* [lanscan](https://github.com/stefanwichmann/lanscan) - Blazing fast, local network scanning in Go\n* [vscan-go](https://github.com/RickGray/vscan-go) - Golang version for nmap service and application version detection\n\n## 📄版权\n\n 该项目签署了GPL-3.0授权许可，详情请参阅[Licence](https://raw.githubusercontent.com/Adminisme/ServerScan/master/Licence)。![gplv3](http://www.gnu.org/graphics/gplv3-or-later.png)\n\n 除此之外也需要遵守项目中如下的补充条款：\n\n 该项目未经作者本人允许，禁止商业使用。\n\n 任何人不得将其用于非法用途及盈利等目的，否则自行承担后果并负相应法律责任。\n\n## 📜免责声明\n\n1. 本工具仅面向拥有合法授权的渗透测试安全人员及进行常规操作的网络运维人员，用户可在取得足够合法授权且非商用的前提下进行下载、复制、传播或使用。\n2. 在使用本工具的过程中，您应确保自己的所有行为符合当地法律法规，且不得将此软件用于违反中国人民共和国相关法律的活动。本工具所有作者和贡献者不承担用户擅自使用本工具从事任何违法活动所产生的任何责任。\n\n请您在下载并使用本工具前，充分阅读、完全理解并接受本协议的所有条款。您的使用行为或您以其他任何方式明示或默认表示接受本协议，即视为您已阅读并同意本协议的约束。\n\n\n# 404StarLink 2.0 - Galaxy\n![](https://github.com/knownsec/404StarLink-Project/raw/master/logo.png)\n\nServerScan 是 404Team [星链计划2.0](https://github.com/knownsec/404StarLink2.0-Galaxy)中的一环，如果对ServerScan有任何疑问又或是想要找小伙伴交流，可以参考星链计划的加群方式。\n\n- [https://github.com/knownsec/404StarLink2.0-Galaxy#community](https://github.com/knownsec/404StarLink2.0-Galaxy#community)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fadminisme%2Fserverscan","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fadminisme%2Fserverscan","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fadminisme%2Fserverscan/lists"}