Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/wybiral/ipv4scan
IoT device scanner.
https://github.com/wybiral/ipv4scan
golang iot netsec
Last synced: 11 days ago
JSON representation
IoT device scanner.
- Host: GitHub
- URL: https://github.com/wybiral/ipv4scan
- Owner: wybiral
- License: mit
- Created: 2019-08-16T20:39:14.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2019-08-19T15:35:30.000Z (about 5 years ago)
- Last Synced: 2024-08-01T19:36:06.174Z (3 months ago)
- Topics: golang, iot, netsec
- Language: Go
- Size: 25.4 KB
- Stars: 40
- Watchers: 4
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ipv4scan
IoT device scanner. Randomly scan the IPv4 address space and collect a real-time JSON stream of all HTTP devices that are found. This stream can then by piped into real-time filters and analytics or piped into storage to be searched as your own personal shodan.## Download latest
All binary releases can be found [here](https://github.com/wybiral/ipv4scan/releases).## Build from source
```
go get github.com/wybiral/ipv4scan
go build github.com/wybiral/ipv4scan
```## Usage
Specify thread count:
```
./ipv4scan -n 1000
```
Specify HTTP port:
```
./ipv4scan -p 8080
```
Specify blacklist:
```
./ipv4scan -b blacklist.conf
```
Scan through SOCKS proxy (such as Tor):
```
./ipv4scan -x socks5://127.0.0.1:9050
```
Specify HTTP request line:
```
./ipv4scan -r "GET /some_resource HTTP/1.1"
```
Example blacklist file: [blacklist.conf](https://github.com/wybiral/ipv4scan/blob/master/blacklist.conf)