Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/R4yGM/netscanner
netscanner - TCP/UDP scanner to find open or closed ports
https://github.com/R4yGM/netscanner
golang network port portscanner scanner tcp
Last synced: about 1 month ago
JSON representation
netscanner - TCP/UDP scanner to find open or closed ports
- Host: GitHub
- URL: https://github.com/R4yGM/netscanner
- Owner: R4yGM
- License: mit
- Created: 2020-03-02T17:26:55.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2020-03-23T19:54:15.000Z (over 4 years ago)
- Last Synced: 2024-08-02T15:48:28.221Z (4 months ago)
- Topics: golang, network, port, portscanner, scanner, tcp
- Language: Go
- Homepage:
- Size: 5.32 MB
- Stars: 206
- Watchers: 11
- Forks: 14
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
[![Build Status](https://travis-ci.org/R4yGM/netscanner.svg?branch=master)](https://travis-ci.org/R4yGM/netscanner)
# netscanner
netscanner - TCP/UDP scanner to find open or closed ports
## installation
you have to run this command to install the program
```shell
$ go get github.com/R4yGM/netscanner
```## Usage
### Commands :
```shell
netscanner 0.1 : TCP/UDP port scannerUsage: netscanner
Commands:
sp,scanport - scan a singular port: usage sp,scanport (ex. scanport tcp 127.0.01 80)
in,initscan - scan the first 1023 ports: usage in,initscan (ex. initscan udp 127.0.0.1 false)
cs,completescan - scan all the ports: usage cs,completescan (ex. completescan tcp 127.0.0.1 true)
sft,scanfromto - scan the ports from a port given to another port given: usage sft,scanfromto (ex. sft tcp 127.0.0.1 80 443 true)
h,help - shows this text
v,version - show the current version of the program
info,information - shows some information about the program
msp,maskscanport - scan a port of all the IPs in Subnet: usage msp,maskscanport (ex. msp tcp 127.0.0.1/24 true)
```
### Parameters:```
- protocol to use - can be tcp or udp
- hostname of the target - ex. 127.0.0.1
- port to scan
- bool that saves the scan in a file - true / false
- port to start scanning
- last port to scan
(for mask scan) - must contain /24 or /32
```
### Example```
$ netscanner sp tcp 127.0.0.1 80Port status service
80/tcp, Closed, http
Scan started at : 2020-03-07 12:16:08.4845743 +0100 CET m=+0.002086201
And finished at : 2020-03-07 12:16:08.4854596 +0100 CET m=+0.002971501```