A tool which is capable of scanning ports as TCP & UDP and detecting open and closed ones.

Overview

PortScanner

Python Level

Scan All Open Ports Of The Target IP.

A tool which is capable of scanning ports as TCP & UDP and detecting open and closed ones.

Clone from GitHub

git clone https://github.com/MSFPT/PortScanner

Example


argument data utilization
--hostname or -h hostname or ip required
--port or -p port optional
--minimum-port or -min-port minimum port optional
--maximum-port or -max-port maximum port optional
--protocol TCP / UDP optional

Types Run


python3 PortScanner --hostname github.com
python3 PortScanner -h github.com

Usage: Python3 PortScanner [hostname]

Scan: Port from 1 to 65535

Protocol: TCP


python3 PortScanner --hostname github.com --port 443
python3 PortScanner -h github.com -p 443

Usage: Python3 PortScanner [hostname] [port]

Scan: Port 443

Protocol: TCP


python3 PortScanner --hostname github.com --maximum-port 510
python3 PortScanner -h github.com -max-port 510

Usage: Python3 PortScanner [hostname] [max-port]

Scan: Port from 1 to 510

Protocol: TCP


python3 PortScanner --hostname github.com --minimum-port 80
python3 PortScanner -h github.com -min-port 80

Usage: Python3 PortScanner [hostname] [min-port]

Scan: Port from 80 to 65535

Protocol: TCP


python3 PortScanner --hostname github.com --minimum-port 80 --maximum-port 510
python3 PortScanner -h github.com -min-port 80 -max-port 510

Usage: Python3 PortScanner [hostname] [min-port] [max-port]

Scan: Port from 80 to 510

Protocol: TCP


python3 PortScanner --hostname github.com --port 6060 --protocol UDP
python3 PortScanner -h github.com -p 6060 --protocol UDP

Usage: Python3 PortScanner [hostname] [protocol]

Scan: Port 6060

Protocol: UDP



help

python3 PortScanner --help
python3 PortScanner -H

developer

python3 PortScanner --developer
python3 PortScanner -D
Owner
Msf Nmt
fools call effort talent ...
Msf Nmt
School Project using Python Sockets and Personal Encryption Method.

Python-Secure-File-Transfer School Project using Python Sockets and Personal Encryption Method. Installation Must have python3 installed on your syste

1 Dec 03, 2021
Pteronode - Script for managing Pterodactyl nodes

pteronode Script for managing Pterodactyl nodes Pteronode allows you to create s

9 Sep 28, 2022
jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients

jarbou3 Jarbou3 is rat tool with coded in python with C&C which can accept multi

youhacker55 108 Dec 29, 2022
A working cloudflare uam bypass !!

Dark Utilities - Cloudflare Uam Bypass Our Website https://over-spam.space/ ! Additional Informations The proxies type are http,https ... You need fas

Inplex-sys 26 Dec 14, 2022
An curated collection of awesome resources about networking in cybersecurity

An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and important practical resources about networking in cybersecurity

Paul Veillard, P. Eng 7 Nov 30, 2022
Dokumentasi belajar Network automation

Repositori belajar network automation dengan Docker, Python & GNS3 Using Frameworks and integrate with: Paramiko Netmiko Telnetlib CSV SFTP Netmiko, S

Daniel.Pepuho 3 Mar 15, 2022
A tiny end-to-end latency testing tool implemented by UDP protocol in Python πŸ“ˆ .

udp-latency A tiny end-to-end latency testing tool implemented by UDP protocol in Python πŸ“ˆ . Features Compare with other existing latency testing too

Chuanyu Xue 5 Dec 02, 2022
Typhon is a macOS specific payload aimed at targetting Jamf managed devices.

Typhon is a macOS specific payload aimed at targetting Jamf managed devices. This payload can be used to manipulate macOS devices into communicating with a Mythic instance, which acts as a Jamf serve

Mythic Agents 29 Dec 23, 2022
simple subdomain finder

Subdomain-finder Simple SubDomain finder using python which is easy to use just download and run it Wordlist you can use your own wordlist but here i

AsjadOwO 5 Sep 24, 2021
Dos attack a Bluetooth connection!

Bluetooth Denial of service Script made for attacking Bluetooth Devices By Samrat Katwal. Warning This project was created only for fun purposes and p

Samrat 1 Oct 29, 2021
Using AWS's API Gateway + Lambda + Python to run a simple websocket application. For learning/testing

Using AWS's API Gateway + Lambda + Python to run a simple websocket application. For learning/testing. The AWS Resources seemed overly complex and were missing some critical gotchas in setting up a s

Seth Miller 15 Dec 23, 2022
A simple tcpdump sidecar injector to demonstrate Kubernetes's Mutating Webhook

k8s-tcpdump-webhook A simple tcpdump sidecar injector to demonstrate Kubernetes's Mutating Webhook Build and Deploy Build docker image; docker build -

Bilal Ünal 2 Sep 01, 2022
HTTP proxy pool server primarily meant for evading IP whitelists

proxy-forwarder HTTP proxy pool server primarily meant for evading IP whitelists. Setup Create a file named proxies.txt and fill it with your HTTP pro

h0nda 2 Feb 19, 2022
High capacity, high availability, well connected, fast lightning node.

LND ⚑ Routing High capacity, high availability, well connected, fast lightning node. We aim to become a top liquidity provider for the lightning netwo

18 Dec 16, 2022
Passive TCP/IP Fingerprinting Tool. Run this on your server and find out what Operating Systems your clients are *really* using.

Passive TCP/IP Fingerprinting This is a passive TCP/IP fingerprinting tool. Run this on your server and find out what operating systems your clients a

Nikolai Tschacher 158 Dec 20, 2022
Wifi-Jamming is a simple, yet highly effective method of causing a DoS on a wireless implemented using python pyqt5.

pyqt5-linux-wifi-jamming-tool Linux-Wifi-Jamming is a simple GUI tool, yet highly effective method of causing a DoS on a wireless implemented using py

lafesa 8 Dec 05, 2022
A library for interacting with APNs and VoIP using HTTP/2.

kalyke A library for interacting with APNs and VoIP using HTTP/2. Installation kalyke requires python 3.6 or later. $ pip install kalyke-apns Usage AP

Yuya Oka 11 Dec 08, 2022
The Delegate Network: An Interactive Voice Response Delegative Democracy Implementation of Liquid Democracy

The Delegate Network Overview The delegate network is a completely transparent, easy-to-use and understand version of what is sometimes called liquid

James Bowery 2 Feb 25, 2022
This is the code repository for Mastering Python for Networking and Security – Second Edition

Mastering Python for Networking and Security – Second Edition This is the code repository for Mastering Python for Networking and Security – Second Ed

Frank Gottinger 1 Feb 09, 2022
A python 3 library which helps in using nmap port scanner.

A python 3 library which helps in using nmap port scanner. This is done by converting each nmap command into a callable python3 method or function. System administrators can now automatic nmap scans

Nmmapper 179 Dec 19, 2022