|Project Name||Stars||Downloads||Repos Using This||Packages Using This||Most Recent Commit||Total Releases||Latest Release||Open Issues||License||Language|
|Bettercap||13,764||15 days ago||61||April 21, 2021||146||other||Go|
|The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.|
|Zmap||4,687||7 days ago||4||August 03, 2021||13||apache-2.0||C|
|ZMap is a fast single packet network scanner designed for Internet-wide network surveys.|
|Ivre||2,865||5 days ago||38||gpl-3.0||Python|
|Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!|
|Cloudfail||1,784||2 months ago||41||mit||Python|
|Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network|
|Sx||1,272||5 days ago||12||August 25, 2021||14||mit||Go|
|:vulcan_salute: Fast, modern, easy-to-use network scanner|
|100 Redteam Projects||1,264||10 days ago||1||Java|
|Projects for security students|
|Androidnetworktools||1,233||a month ago||29||apache-2.0||Java|
|Set of useful android network tools|
|BitTorrent P2P multi-platform search engine for Desktop and Web servers with integrated torrent client.|
|WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices|
|Pythem||1,139||4 years ago||7||March 05, 2018||10||gpl-3.0||Python|
fi6s is an IPv6 port scanner designed to be fast. This is achieved by sending and processing raw packets asynchronously. The design and goal is pretty similar to Masscan, though it is not as full-featured yet.
Building fi6s is fairly easy on any recent Linux system, e.g. on Ubuntu:
# apt install gcc make git libpcap-dev $ git clone https://github.com/sfan5/fi6s.git $ cd fi6s $ make BUILD_TYPE=release
The scanner executable will be ready at
Note that fi6s is developed and tested solely on Linux. It should work on other UNIX-like platforms, but don't expect it to run on Windows.
Usage is pretty easy, fi6s will try to auto-detect the dirty technical details such as source, router MAC addresses and source IP.
# ./fi6s -p 80,8000-8100 2001:db8::/120
This example will:
There are more different ways of specifying an address range to scan,
if you aren't sure what's about to happen invoke fi6s with
to print all IPs or
--print-summary to get a quick overview about the scan.
For more advanced features please consult the output of
Since fi6s has its own TCP stack, the OS' stack needs to disabled to avoid
interference with banner grabbing (RST packets). This is easily done using
ip6tables and a constant
Banner grabbing is then enabled by passing
# ip6tables -A INPUT -p tcp -m tcp --dport 12345 -j DROP # ./fi6s -p 22 --banners --source-port 12345 2001:db8::xx
Dropping packets before they reach the OS stack is not required for UDP scans, but is still a good idea to avoid a flood of ICMPv6 unreachable responses.
Other than that you only need an additional
# ip6tables -A INPUT -p udp -m udp --dport 12345 -j DROP # ./fi6s -p 53 --banners --udp --source-port 12345 2001:db8::xx
Note that unlike with TCP, you will only get useful (or any) results if you scan
a port whose protocol is supported by fi6s. You can use
to view a list.