1. Cybersecurity >
  2. Cybersecurity Nachrichten >
  3. Nray - Distributed Port Scanner


Nray - Distributed Port Scanner

IT Security Nachrichten vom | Direktlink: feedproxy.google.com Nachrichten Bewertung

Nray is a free, platform and architecture independent port and application layer scanner. Apart from regular targets (list of hosts/networks), it supports dynamic target selection, based on source like transparency logs" href="https://www.kitploit.com/search/label/Certificate%20transparency%20logs">certificate transparency logs or LDAP. Furthermore, nray allow to run in a distributed manner to speed up scans and to perform scans from different vantage points. Event-based results allow to further process information during the scan, e.g. using tools like jq or full-blown data analysis platforms like elasticsearch or Splunk.
This is the main repository where nray is developed. Downloads are here. If you are looking for user documentation, have a look at the project homepage. For information related to developing and contributing to nray, continue reading.
Nray is written in pure Go and its versioning follows the semantic versioning model. The development follows Vincent Driessen's "A successful git branching" model, therefore we try to keep the master branch stable and in line with releases whereas development happens on the development branch as well as branches derived from there.

Care was taken to mostly stay in line with Go's build system, meaning that the project can be built with a plain go build. Nray is written in pure Go and care was taken to select only dependencies that also fulfill this requirement, therefore a standard Go installation (plus git) is enough to build nray on and for any supported platform.

With makefile
Nevertheless, there is a makefile that is supposed to be used for building production versions (make release) - it ensures that no C dependencies are linked in and symbols are stripped from binaries to save space. Also, binaries for most common operating systems are created automatically. A call to make will build a local development version, tailored to your current OS and architecture with C libraries and Go's race detector linked in.

Without makefile
Simply run go build - in case cross compiling is desired, GOOS and GOARCH parameters control target OS and architecture. For nodes, it is possible to inject server location and port directly into the binary: go build -ldflags "-X main.server= -X main.port=8601". To get smaller binaries, strip stuff that is not necessary away via -ldflags="-s -w" when calling go build. If you need to rebuild the protobuf schemas (this is not required unless you change the wire protocol!), run make create-schemas (which requires the protobuf compiler on your system).

Contributing and Development
Just grab the code and fix stuff that annoys you or hack in new awesome features! Every contribution is welcome and the goal is to make nray an awesome project for users and contributors!
Your code should pass standard checks performed by go vet and go lint. I recommend using Visual Studio Code with its Go support enabled, it is a really good IDE that brings such issues up early. Nray is always developed against the latest Go release, so if you are having trouble building nray, check if you have the latest go version installed.


Externe Quelle mit kompletten Inhalt anzeigen

Zur Startseite von Team IT Security

➤ Weitere Beiträge von Team Security | IT Sicherheit

Nray - Distributed Port Scanner

vom 704.44 Punkte ic_school_black_18dp
Nray is a free, platform and architecture independent port and application layer scanner. Apart from regular targets (list of hosts/networks), it supports dynamic target selection, based on source like transparency logs" href="https://www.kitploit.com/

Pentest Tools Framework - A Database Of Exploits, Scanners And Tools For Penetration Testing

vom 421.48 Punkte ic_school_black_18dp
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities.NEWS Modules PTF UPDATEPTF OPtions

AutoRecon - Multi-Threaded Network Reconnaissance Tool Which Performs Automated Enumeration Of Services

vom 352.6 Punkte ic_school_black_18dp
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements. The tool works by firstly performing port scans/service detection scans. From those initial results, the tool will launch further enum

Improvements in .NET Core 3.0 for troubleshooting and monitoring distributed apps

vom 343.65 Punkte ic_school_black_18dp
Post was authored by Sergey Kanzhelev. Thank you David Fowler and Richard Lander for reviews. Introduction Operating distributed apps is hard. Distributed apps typically consists of multiple components. These components may be owned and operated by different teams. Every interact

Mistica - An Open Source Swiss Army Knife For Arbitrary Communication Over Application Protocols

vom 329.85 Punkte ic_school_black_18dp
Mística is a tool that allows to embed data into application layer protocol fields, with the goal of establishing a bi-directional channel for arbitrary communications. Currently, encapsulation into HTTP, DNS and ICMP protocols has been implemented, b

Web Hacker's Weapons - A Collection Of Cool Tools Used By Web Hackers

vom 315.16 Punkte ic_school_black_18dp
A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting.WeaponsType Name DescriptionArmy-Knife/ALL BurpSuite the BurpSuite project Army-Knife/SCAN jaeles The Swiss Army knife for automated Web Application Testing Army

Forerunner - Fast And Extensible Network Scanning Library Featuring Multithreading, Ping Probing, And Scan Fetchers

vom 304.33 Punkte ic_school_black_18dp
The Forerunner library is a fast, lightweight, and extensible networking library created to aid in the development of robust network centric applications such as: IP Scanners, Port Knockers, Clients, Servers, etc. In it's current state, the Forerunner library is able to both synchronously and asynchronously scan and port knock IP addresses in order to obtain information about the device located

PivotSuite - A Network Pivoting Toolkit

vom 301.42 Punkte ic_school_black_18dp
PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client.PivotSuite as a Server :If the compromised host is directly accessable (Forward Connection) from Our pentest machine, Then we can run

Cotopaxi - Set Of Tools For Security Testing Of Internet Of Things Devices Using Specific Network IoT Protocols

vom 267.29 Punkte ic_school_black_18dp
Set of tools for security testing of Internet of Things devices using protocols like: CoAP, DTLS, HTCPCP, mDNS, MQTT, SSDP.Installation:Simply clone code from git: https://github.com/Samsung/cotopaxiRequirements:Currently Cotopaxi works only with Python

Venom - A Multi-hop Proxy For Penetration Testers

vom 233.17 Punkte ic_school_black_18dp
Venom is a multi-hop proxy tool developed for penetration testers using Go. You can use venom to easily proxy network traffic to a multi-layer intranet, and easily manage intranet nodes.Features network topology multi-hop socks5 proxy multi-hop port forward port r

Sshtunnel - SSH Tunnels To Remote Server

vom 199.05 Punkte ic_school_black_18dp
Inspired by https://github.com/jmagnusson/bgtunnel, which doesn't work on Windows.See also: https://github.com/paramiko/paramiko/blob/master/demos/forward.py Requirementsparamiko Installationsshtunnel is on PyPI, so simply run:pip install sshtunneloreasy_

Help needed with running Python script that uses Selenium

vom 187.67 Punkte ic_school_black_18dp
Hey all, I'm trying to use a tool that I successfully used on Ubuntu now that I've swapped that out for Parrot. I ended up jumping over to Parrot for all of the included security tools but it's shot me in the foot and I'm hoping you can help. I'm pr

Team Security Diskussion über Nray - Distributed Port Scanner