Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Esc4iCEscEsc/skanuvaty
Dangerously fast DNS/network/port scanner
https://github.com/Esc4iCEscEsc/skanuvaty
cybersecurity dns dns-client hacking-tools osint-tool penetration-testing penetration-testing-tools pentest pentesting redteam redteam-tools rust rust-lang scanner security security-tools subdomain-enumeration subdomain-scanner
Last synced: about 1 month ago
JSON representation
Dangerously fast DNS/network/port scanner
- Host: GitHub
- URL: https://github.com/Esc4iCEscEsc/skanuvaty
- Owner: Esc4iCEscEsc
- Created: 2022-03-15T17:32:36.000Z (over 2 years ago)
- Default Branch: master
- Last Pushed: 2022-03-18T12:36:50.000Z (over 2 years ago)
- Last Synced: 2024-10-30T05:55:30.248Z (about 1 month ago)
- Topics: cybersecurity, dns, dns-client, hacking-tools, osint-tool, penetration-testing, penetration-testing-tools, pentest, pentesting, redteam, redteam-tools, rust, rust-lang, scanner, security, security-tools, subdomain-enumeration, subdomain-scanner
- Language: Rust
- Homepage:
- Size: 1.19 MB
- Stars: 885
- Watchers: 17
- Forks: 82
- Open Issues: 9
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-offensive-rust - Skanuvaty - Dangerously fast DNS/network/port scanner (Projects)
- awesome-hacking-lists - Esc4iCEscEsc/skanuvaty - Dangerously fast DNS/network/port scanner (Rust)
README
# Skanuvaty
Dangerously fast dns/network/port scanner, all-in-one.
![Demonstration](./demo.gif)
Start with a domain, and we'll find everything about it.
Features:
- Finds subdomains from root domain
- Finds IPs for subdomains
- Checks what ports are open on those IPs (Notice: not yet implemented)Outputs a handy .json file with all the data for further investigation.
Runs as fast as your computer/network/DNS resolver allows it to be. Test run for 10.000 subdomains
tested all of them in ~20 seconds with `concurrency` set to 16 on a machine with 16 (logical) cores.## Usage
```shell
skanuvaty --target nmap.org --concurrency 16 --subdomains-file /usr/share/dnsenum/dns.txt
```The terminal will show all found subdomains + a `skanuvaty.scan.json` file has been created in your current directory.
## License
MIT 2021