Popularity
5.2
Declining
Activity
0.0
Stable
205
11
14
Programming language: Go
License: MIT License
netscanner alternatives and similar packages
Based on the "Networking" category.
Alternatively, view netscanner alternatives based on common mentions on social networks and blogs.
-
kcptun
A Stable & Secure Tunnel based on KCP with N:M multiplexing and FEC. Available for ARM, MIPS, 386 and AMD64。N:M 多重化と FEC を備えた KCP に基づく安定した安全なトンネル。 N:M 다중화 및 FEC를 사용하는 KCP 기반의 안정적이고 안전한 터널입니다. Un tunnel stable et sécurisé basé sur KCP avec multiplexage N:M et FEC. -
fasthttp
Fast HTTP package for Go. Tuned for high performance. Zero memory allocations in hot paths. Up to 10x faster than net/http -
gnet
🚀 gnet is a high-performance, lightweight, non-blocking, event-driven networking framework written in pure Go./ gnet 是一个高性能、轻量级、非阻塞的事件驱动 Go 网络框架。 -
Netmaker
Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks. -
mqttPaho
The Paho Go Client provides an MQTT client library for connection to MQTT brokers via TCP, TLS or WebSockets. -
fortio
Fortio load testing library, command line tool, advanced echo server and web UI in go (golang). Allows to specify a set query-per-second load and record latency histograms and other useful stats. -
nbio
Pure Go 1000k+ connections solution, support tls/http1.x/websocket and basically compatible with net/http, with high-performance and low memory cost, non-blocking, event-driven, easy-to-use. -
gev
🚀Gev is a lightweight, fast non-blocking TCP network library / websocket server based on Reactor mode. Support custom protocols to quickly and easily build high-performance servers. -
gmqtt
Gmqtt is a flexible, high-performance MQTT broker library that fully implements the MQTT protocol V3.x and V5 in golang -
easytcp
:sparkles: :rocket: EasyTCP is a light-weight TCP framework written in Go (Golang), built with message router. EasyTCP helps you build a TCP server easily fast and less painful. -
peerdiscovery
Pure-Go library for cross-platform local peer discovery using UDP multicast :woman: :repeat: :woman: -
raw
DISCONTINUED. Package raw enables reading and writing data at the device driver level for a network interface. MIT Licensed. -
ethernet
Package ethernet implements marshaling and unmarshaling of IEEE 802.3 Ethernet II frames and IEEE 802.1Q VLAN tags. MIT Licensed.
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
Promo
www.influxdata.com
Do you think we are missing an alternative of netscanner or a related project?
Popular Comparisons
README
netscanner
netscanner - TCP/UDP scanner to find open or closed ports
installation
you have to run this command to install the program
$ go get github.com/R4yGM/netscanner
Usage
Commands :
netscanner 0.1 : TCP/UDP port scanner
Usage: netscanner <command>
Commands:
sp,scanport - scan a singular port: usage sp,scanport <protocol> <hostname> <port> (ex. scanport tcp 127.0.01 80)
in,initscan - scan the first 1023 ports: usage in,initscan <protocol> <hostname> <savefilebool>(ex. initscan udp 127.0.0.1 false)
cs,completescan - scan all the ports: usage cs,completescan <protocol> <hostname> <savefilebool>(ex. completescan tcp 127.0.0.1 true)
sft,scanfromto - scan the ports from a port given to another port given: usage sft,scanfromto <protocol> <hostname> <startport> <endport> <savefile>(ex. sft tcp 127.0.0.1 80 443 true)
h,help - shows this text
v,version - show the current version of the program
info,information - shows some information about the program
msp,maskscanport - scan a port of all the IPs in Subnet: usage msp,maskscanport <protocol> <hostname> <port> <savefilebool>(ex. msp tcp 127.0.0.1/24 true)
Parameters:
<protocol> - protocol to use - can be tcp or udp
<hostname> - hostname of the target - ex. 127.0.0.1
<port> - port to scan
<savefile> - bool that saves the scan in a file - true / false
<startport> - port to start scanning
<endport> - last port to scan
<hostname>(for mask scan) - must contain /24 or /32
Example
$ netscanner sp tcp 127.0.0.1 80
Port status service
80/tcp, Closed, http
Scan started at : 2020-03-07 12:16:08.4845743 +0100 CET m=+0.002086201
And finished at : 2020-03-07 12:16:08.4854596 +0100 CET m=+0.002971501