Furious

Golang IP/port scanner with SYN (stealth) scanning and device manufacturer identification
Alternatives To Furious
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Trivy18,6834416 hours ago198July 31, 2023180apache-2.0Go
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Nuclei14,6991019 hours ago376July 28, 2023193mitGo
Fast and customizable vulnerability scanner based on simple YAML based DSL.
Bettercap14,547
4 days ago61April 21, 2021164otherGo
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Routersploit11,367
4 months ago98otherPython
Exploitation Framework for Embedded Devices
Rustscan10,721
a month ago18November 07, 2022128gpl-3.0Rust
🤖 The Modern Port Scanner 🤖
Dirsearch10,278
2 days ago8October 03, 202269Python
Web path scanner
Vuls10,257
a day ago154June 29, 202389gpl-3.0Go
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Awesome Security10,248
7 days ago11mit
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Tsunami Security Scanner7,930410 days ago18July 25, 202340apache-2.0Java
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
Wpscan7,794
17 days ago59otherRuby
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via [email protected]
Alternatives To Furious
Select To Compare


Alternative Project Comparisons
Readme

Furious IP/Port Scanner

Furious is a fast, lightweight, portable network scanner.

Screenshot 1 Screenshot 2

I haven't done any proper performance testing, but a SYN scan of a single host, including all known ports (~6000) will typically take in the region of 4 seconds. On the same machine, nmap took 98 seconds and produced exactly the same results.

Install

You'll need to install libpcap.

  • On Linux, install libpcap with your package manager
  • On OSX, brew install libpcap
  • On Windows, install WinPcap

Then just:

go get -u github.com/liamg/furious

Options

-s [TYPE] --scan-type [TYPE]

Use the specified scan type. The options are:

Type Description
syn A SYN/stealth scan. Most efficient scan type, using only a partial TCP handshake. Requires root privileges.
connect A less detailed scan using full TCP handshakes, though does not require root privileges.
device Attempt to identify device MAC address and manufacturer where possible. Useful for listing devices on a LAN.

The default is a SYN scan.

-p [PORTS] --ports [PORTS]

Scan the specified ports. Defaults to a list of all known ports as provided by IANA.

Ports may be specified using a comma delimited list, and ranges are also allowed.

For example:

--ports 22,80,443,8080-8082

...will scan 22, 80, 443, 8080, 8081, and 8082.

-t [MS] --timout-ms [MS]

The network timeout to apply to each port being checked. Default is 1000ms.

-w [COUNT] --workers [COUNT]

The number of worker routines to use to scan ports in parallel. Default is 1000 workers.

-u --up-only

Only show output for hosts that are confirmed as up.

--version

Output version information and exit.

Usage

Furious can be used to:

Find open ports on one or more hosts

Scan a single host:

furious 192.168.1.4 

Scan a whole CIDR:

furious 192.168.1.0/24 

Scan a mixture of IPs, hostnames and CIDRs

furious -s connect 8.8.8.8 192.168.1.1/24 google.com

Run a SYN (stealth) scan (with root privileges)

sudo -E furious -s syn 192.168.1.1

Run a connect scan as any user

furious -s connect 192.168.1.1

Identify device MAC address and manufacturer within a local network

furious -s device 192.168.1.1/24 -u

Troubleshooting

sudo: furious: command not found

If you installed using go, your user has the environment variables required to locate go programs, but root does not. You need to:

sudo env "PATH=$PATH" furious

SYN/Connect scans are slower than nmap!

They're not in my experience, but with default arguments furious scans nearly six times as many ports as nmap does by default.

Popular Scanner Projects
Popular Security Projects
Popular Security Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Go
Security
Port
Scanner
Nmap
Port Scanner