Open-source tool for network discovery, visualization, and monitoring. Built with Go, FastAPI, and React, supports Docker host scanning.
-
Updated
Nov 11, 2025 - JavaScript
8000
Open-source tool for network discovery, visualization, and monitoring. Built with Go, FastAPI, and React, supports Docker host scanning.
Network, recon and offensive-security tool for Linux.
A simple and lightweight C# ARP scanner to identify live hosts in your LAN
NMAP wrapper enabling easy use in NodeJS.
This package implements an asynchronous network scanner.
SYSIS is a cross-platform script that displays base system & network information
Python port scanner tool
Python script to quickly discover live hosts on a network through multi-threaded TCP pinging and various ICMP types.
A simple script to identify a host's operating system by its IP address
SSH Finder is a fast and flexible tool for discovering accessible SSH hosts and testing login credentials.
Find out who is on your LAN. Was made with low-privilege users in mind...
CM Security Tools 是一款模块化、多线程的网络安全扫描工具包,集成主机发现、端口扫描、弱口令检测和子域名枚举等功能,适用于渗透测试与安全研究。
A simple Rust crate for host discovery
A threaded ICMP/TCP host discovery tool that identifies live hosts across subnets and outputs Nmap-ready host lists.
🔍 Discover and analyze your network with LanScan, a powerful tool for scanning and visualizing diagnostics and metrics effortlessly.
A Node.js-based host discovery tool and module that uses SNMP to find hosts on subnets.
🐝 BeeHost - VHost matching with FFuF
ThreatSight is an advanced Python-based network scanning tool that automates security assessments by combining Nmap's powerful scanning engine with automated vulnerability correlation and risk prioritization. Designed for security teams and network administrators, it transforms raw scan data into actionable security insights.
Scripts en python y bash enfocados al lado ofensivo
Internal Penetration Testing is a security assessment conducted from within an organization’s network to identify and exploit vulnerabilities that could be accessed by an insider or an attacker who has already breached the network perimeter.
Add a description, image, and links to the host-discovery topic page so that developers can more easily learn about it.
To associate your repository with the host-discovery topic, visit your repo's landing page and select "manage topics."