Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Trivy | 18,683 | 44 | 16 hours ago | 198 | July 31, 2023 | 180 | apache-2.0 | Go | ||
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more | ||||||||||
Nuclei | 14,699 | 10 | 19 hours ago | 376 | July 28, 2023 | 193 | mit | Go | ||
Fast and customizable vulnerability scanner based on simple YAML based DSL. | ||||||||||
Bettercap | 14,547 | 4 days ago | 61 | April 21, 2021 | 164 | other | Go | |||
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks. | ||||||||||
Routersploit | 11,367 | 4 months ago | 98 | other | Python | |||||
Exploitation Framework for Embedded Devices | ||||||||||
Rustscan | 10,721 | a month ago | 18 | November 07, 2022 | 128 | gpl-3.0 | Rust | |||
🤖 The Modern Port Scanner 🤖 | ||||||||||
Dirsearch | 10,278 | 2 days ago | 8 | October 03, 2022 | 69 | Python | ||||
Web path scanner | ||||||||||
Vuls | 10,257 | a day ago | 154 | June 29, 2023 | 89 | gpl-3.0 | Go | |||
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices | ||||||||||
Awesome Security | 10,248 | 7 days ago | 11 | mit | ||||||
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. | ||||||||||
Tsunami Security Scanner | 7,930 | 4 | 10 days ago | 18 | July 25, 2023 | 40 | apache-2.0 | Java | ||
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. | ||||||||||
Wpscan | 7,794 | 17 days ago | 59 | other | Ruby | |||||
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via [email protected] |
Furious is a fast, lightweight, portable network scanner.
I haven't done any proper performance testing, but a SYN scan of a single host, including all known ports (~6000) will typically take in the region of 4 seconds. On the same machine, nmap took 98 seconds and produced exactly the same results.
You'll need to install libpcap.
libpcap
with your package managerbrew install libpcap
Then just:
go get -u github.com/liamg/furious
-s [TYPE]
--scan-type [TYPE]
Use the specified scan type. The options are:
Type | Description |
---|---|
syn |
A SYN/stealth scan. Most efficient scan type, using only a partial TCP handshake. Requires root privileges. |
connect |
A less detailed scan using full TCP handshakes, though does not require root privileges. |
device |
Attempt to identify device MAC address and manufacturer where possible. Useful for listing devices on a LAN. |
The default is a SYN scan.
-p [PORTS]
--ports [PORTS]
Scan the specified ports. Defaults to a list of all known ports as provided by IANA.
Ports may be specified using a comma delimited list, and ranges are also allowed.
For example:
--ports 22,80,443,8080-8082
...will scan 22, 80, 443, 8080, 8081, and 8082.
-t [MS]
--timout-ms [MS]
The network timeout to apply to each port being checked. Default is 1000ms.
-w [COUNT]
--workers [COUNT]
The number of worker routines to use to scan ports in parallel. Default is 1000 workers.
-u
--up-only
Only show output for hosts that are confirmed as up.
--version
Output version information and exit.
Furious can be used to:
Scan a single host:
furious 192.168.1.4
Scan a whole CIDR:
furious 192.168.1.0/24
furious -s connect 8.8.8.8 192.168.1.1/24 google.com
sudo -E furious -s syn 192.168.1.1
furious -s connect 192.168.1.1
furious -s device 192.168.1.1/24 -u
sudo: furious: command not found
If you installed using go, your user has the environment variables required to locate go programs, but root does not. You need to:
sudo env "PATH=$PATH" furious
They're not in my experience, but with default arguments furious scans nearly six times as many ports as nmap does by default.