port-scanner
Here are 164 public repositories matching this topic...
-
Updated
Nov 15, 2019 - Shell
-
Updated
Apr 7, 2020 - Perl
-
Updated
Nov 9, 2020 - Python
-
Updated
May 10, 2019 - Python
-
Updated
Aug 21, 2020 - Python
-
Updated
Jan 23, 2019 - JavaScript
-
Updated
Dec 31, 2019 - Go
-
Updated
Nov 11, 2017 - Python
-
Updated
Nov 23, 2020 - Java
-
Updated
Apr 19, 2020 - Go
-
Updated
Feb 20, 2018 - C
-
Updated
Oct 11, 2020
-
Updated
Nov 21, 2020 - PowerShell
-
Updated
Sep 8, 2020 - Python
-
Updated
Sep 15, 2020 - Nim
-
Updated
Oct 24, 2020 - Python
-
Updated
May 27, 2020 - JavaScript
-
Updated
Sep 25, 2020 - Shell
Describe the bug
In feature/python3.8 the scanner.py config.json location is giving error.
To Reproduce
Steps to reproduce the behavior:
- Go to 'feature/python3.8' in '/src/single/' folder
- Run the scanner.py
Expected behavior
It should give the open ports. But it gives error 'file not found'
-
Updated
Jun 7, 2020 - Python
-
Updated
Jun 15, 2017 - Shell
Hello !
A Fake Process will be awesome.
This is an example of a fake process command line :
trcpy(argv[0],FAKE); // fake the proccess name.
while(fgets(buff,sizeof(buff),fp))
{
c=strchr(buff,'n');
if(c!=NULL) *c='.';
if (!(fork()))
{
where=0;
// printf("--> attacking %s",buff);
for (i=0; i<count; i=i+2){
// printf("--> Trying %s:%s %sn",a[i],a[i+1],buff);
checkauth(a[i],a[i+1],buff
Would it be possible to add support for excluding specific ports? I'm thinking this could be an additional argument passed to the script (a comma-delimited list of ports).
An example call could look like the following:
portforge.cr localhost 4440 4445 4442,4443
This would exclude ports 4442 and 4443.
The reasoning behind my feature request is that I might want to run a web server on
-
Updated
Nov 25, 2020 - Python
-
Updated
Feb 24, 2018 - C#
Improve this page
Add a description, image, and links to the port-scanner topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the port-scanner topic, visit your repo's landing page and select "manage topics."


The script is described as
At the moment the script reports all hostname-like identities where the input/target hostname is present somewhere in the identity. Specifically, the script does not verify that a returned identity is truly a subdomain of the target hostname.
As an ex