|Project Name||Stars||Downloads||Repos Using This||Packages Using This||Most Recent Commit||Total Releases||Latest Release||Open Issues||License||Language|
|Trivy||18,683||44||16 hours ago||198||July 31, 2023||180||apache-2.0||Go|
|Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more|
|Nuclei||14,699||10||19 hours ago||376||July 28, 2023||193||mit||Go|
|Fast and customizable vulnerability scanner based on simple YAML based DSL.|
|Bettercap||14,547||4 days ago||61||April 21, 2021||164||other||Go|
|The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.|
|Routersploit||11,367||4 months ago||98||other||Python|
|Exploitation Framework for Embedded Devices|
|Rustscan||10,721||a month ago||18||November 07, 2022||128||gpl-3.0||Rust|
|🤖 The Modern Port Scanner 🤖|
|Dirsearch||10,278||2 days ago||8||October 03, 2022||69||Python|
|Web path scanner|
|Vuls||10,257||a day ago||154||June 29, 2023||89||gpl-3.0||Go|
|Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices|
|Awesome Security||10,248||7 days ago||11||mit|
|A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.|
|Tsunami Security Scanner||7,930||4||10 days ago||18||July 25, 2023||40||apache-2.0||Java|
|Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.|
|Wpscan||7,794||17 days ago||59||other||Ruby|
|WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via [email protected]|
Furious is a fast, lightweight, portable network scanner.
I haven't done any proper performance testing, but a SYN scan of a single host, including all known ports (~6000) will typically take in the region of 4 seconds. On the same machine, nmap took 98 seconds and produced exactly the same results.
You'll need to install libpcap.
libpcapwith your package manager
brew install libpcap
go get -u github.com/liamg/furious
Use the specified scan type. The options are:
||A SYN/stealth scan. Most efficient scan type, using only a partial TCP handshake. Requires root privileges.|
||A less detailed scan using full TCP handshakes, though does not require root privileges.|
||Attempt to identify device MAC address and manufacturer where possible. Useful for listing devices on a LAN.|
The default is a SYN scan.
Scan the specified ports. Defaults to a list of all known ports as provided by IANA.
Ports may be specified using a comma delimited list, and ranges are also allowed.
...will scan 22, 80, 443, 8080, 8081, and 8082.
The network timeout to apply to each port being checked. Default is 1000ms.
The number of worker routines to use to scan ports in parallel. Default is 1000 workers.
Only show output for hosts that are confirmed as up.
Output version information and exit.
Furious can be used to:
Scan a single host:
Scan a whole CIDR:
furious -s connect 18.104.22.168 192.168.1.1/24 google.com
sudo -E furious -s syn 192.168.1.1
furious -s connect 192.168.1.1
furious -s device 192.168.1.1/24 -u
sudo: furious: command not found
If you installed using go, your user has the environment variables required to locate go programs, but root does not. You need to:
sudo env "PATH=$PATH" furious
They're not in my experience, but with default arguments furious scans nearly six times as many ports as nmap does by default.