项目作者: captain-woof

项目描述 :
A simple, fast port scanner that can work with Nmap.
高级语言: Python
项目地址: git://github.com/captain-woof/DirtyPortScanner.git
创建时间: 2020-12-04T11:25:03Z
项目社区:https://github.com/captain-woof/DirtyPortScanner

开源协议:

下载


DirtyPortScanner

Introduction

DirtyPortScanner simply scans the range of ports you supply and shows which one of them might be open, plus any banners if any. This it does by connecting to each specified port, and checking if a connection is made, which indicates an open port. Any response (like a banner) is checked as well by sending desired strings to each port.

Also, you can directly invoke nmap with the results of DirtyPortScanner if you wish, along with your chosen nmap arguments. See usage below.

The maximum number of concurrent threads is the maximum number of ports that will be scanned simultaneously, so crank it up to get amazing speeds. If very, very high number of threads crash the script, simply reduce this.

Preview

Preview

Usage

  1. usage: dirty_port_scanner.py [-h] -a ADDRESS -p PORT_RANGE [-t THREADS] [-m MAX_TRIES] [-u TIMEOUT]
  2. [-j PROBE_STRING | -J PROBE_STRING_FILE] [-o OUTPUT] [--nmap NMAP]
  3. [--nmap-ports {discovered,all,manual}] [--nmap-path NMAP_PATH]
  4. [--full-banner]
  5. optional arguments:
  6. -h, --help show this help message and exit
  7. -a ADDRESS, --address ADDRESS
  8. The destination host to probe
  9. -p PORT_RANGE, --port-range PORT_RANGE
  10. The ports to probe; separate ports by a comma ',', ranges by a hyphen '-';
  11. Example: 1-1000,3289,4444,8000-9000...
  12. -t THREADS, --threads THREADS
  13. The maximum number of concurrent threads to use; default is 10; INCREASE
  14. FOR SPEED!
  15. -m MAX_TRIES, --max-tries MAX_TRIES
  16. Maximum number of retries for probing each port: default is 3
  17. -u TIMEOUT, --timeout TIMEOUT
  18. Maximum number of seconds to wait for each probe's response; default is 3
  19. seconds
  20. -j PROBE_STRING, --probe-string PROBE_STRING
  21. Choose a custom string to probe ports with; default:
  22. AAAAAAAAAAAAAAAAAAA\r\n\r\n
  23. -J PROBE_STRING_FILE, --probe-string-file PROBE_STRING_FILE
  24. Choose a custom file which contains strings to probe ports with; provided
  25. file will be read in binary mode
  26. -o OUTPUT, --output OUTPUT
  27. Save scan results to a file with specified filename; using with nmap will
  28. output nmap results to another file with same name but with '_nmap' as
  29. prefix
  30. --nmap NMAP, -n NMAP Start an nmap scan automatically with specified nmap args here, enclosed
  31. within double-inverted commas; nmap must be installed for this; also,
  32. don't manually specify any ports here
  33. --nmap-ports {discovered,all,manual}, -P {discovered,all,manual}
  34. Specify ports to use in the nmap scan; 'discovered' automatically selects
  35. only the discovered ports, 'all' uses your original port range/s, 'manual'
  36. prompts you after scan for you to specify port ranges for the nmap scan;
  37. default is 'discovered'
  38. --nmap-path NMAP_PATH
  39. Path to nmap; no need to use this option if nmap is in PATH with the
  40. proper name
  41. --full-banner, -b Display the full banner received instead of only the first line (default)
  42. --banner-number BANNER_NUMBER, -bn BANNER_NUMBER
  43. Choose the nth banner to grab and display (default: 1st banner)

Windows Executable

Generated with PyInstaller on Windows 7, so it should work on any version of Windows 7 and above.

Author

Author: CaptainWoof

Twitter: @realCaptainWoof