Crates.io | nscan |
lib.rs | nscan |
version | 1.2.0 |
source | src |
created_at | 2021-05-04 17:24:16.539044 |
updated_at | 2024-07-21 14:27:28.407548 |
description | Cross-platform network scan tool for host and service discovery |
homepage | https://github.com/shellrow/nscan |
repository | https://github.com/shellrow/nscan |
max_upload_size | |
id | 393115 |
size | 3,879,590 |
Cross-platform network scan tool for host and service discovery.
Aims to be simple, fast, and efficient in performance.
nscan
will now be succeeded by nrev, our network mapping tool. Updates to nscan
will be limited going forward, as we aim to keep nscan
focused on scanning-specific tasks. We encourage all users to migrate to nrev
for the latest features and improvements.
curl --proto '=https' --tlsv1.2 -LsSf https://github.com/shellrow/nscan/releases/latest/download/nscan-installer.sh | sh
irm https://github.com/shellrow/nscan/releases/latest/download/nscan-installer.ps1 | iex
brew install shellrow/tap-nscan/nscan
You can download archives of precompiled binaries from the releases .
cargo install nscan
Or you can use binstall for install nscan from github release.
cargo binstall nscan
To scan the default ports on a target, simply specify the target:
nscan --target scanme.nmap.org
Usage: nscan [OPTIONS] [COMMAND]
Commands:
port Scan port. nscan port --help for more information
host Scan host in specified network or host-list. nscan host --help for more information
subdomain Find subdomains. nscan subdomain --help for more information
interfaces Show network interfaces
interface Show default network interface
check Check dependencies (Windows only)
help Print this message or the help of the given subcommand(s)
Options:
-t, --target <target> Specify the target host. IP address or Hostname
-i, --interface <interface_name> Specify the network interface
--noping Disable initial ping
-F, --full Scan all ports (1-65535)
-j, --json Displays results in JSON format.
-o, --save <file_path> Save scan result in JSON format - Example: -o result.json
-q, --quiet Quiet mode. Suppress output. Only show final results.
-h, --help Print help
-V, --version Print version
nscan
uses raw sockets, which require elevated privileges. Execute with administrator rights.
When using nscan on Windows, please consider the following: