Skip to content
Mass scan IPs for vulnerable services
Branch: master
Clone or download
Type Name Latest commit message Commit time
Failed to load latest commit information.
core intial release Dec 17, 2019
db intial release Dec 17, 2019
modules intial release Dec 17, 2019
LICENSE Initial commit Dec 16, 2019 added setup guide (Resolves #5) Dec 19, 2019
requirements.txt added psutil Dec 18, 2019 formatted masscan command Dec 18, 2019


Mass Vulnerability Scanner


masscan is fast, nmap can fingerprint software and vulners is a huge vulnerability database. Silver is a front-end that allows complete utilization of these programs by parsing data, spawning parallel processes, caching vulnerability data for faster scanning over time and much more.



  • Resumable scanning
  • Slack notifcations
  • multi-core utilization
  • Vulnerability data caching
  • Smart Shodan integration*

*Shodan integration is optional but when linked, Silver can automatically use Shodan to retrieve service and vulnerability data if a host has a lot of ports open to save resources. Shodan credits used per scan by Silver can be throttled. The minimum number of ports to trigger Shodan can be configured as well.


Downloading Silver

git clone


External Programs
Python libraries
  • psutil
  • requests

Required Python libraries can be installed by executing pip3 install -r requirements.txt in Silver directory.


Slack WebHook, Shodan API key and limits can be configured by editing respective variables in /core/

Setting up Slack notifications

  • Create a workspace on slack, here
  • Create an app, here
  • Enable WebHooks from the app and copy the URL from there to Silver's /core/ file.

Run it as root

Silver requires root permission because it uses masscan under the hood which needs to be run as root to do port scanning. Use sudo.


Before you start

⚠️ Run Silver as root and with python3 i.e. with sudo python3 <your input>

⚠️ Silver scans all TCP ports by default i.e. ports 0-65535. Use --quick switch to only scan top ~1000 ports.

Scan host(s) from command line

Scan top ~1000 ports
python3 --quick
Scan hosts from a file
python3 -i /path/to/targets.txt
Set max number of parallel nmap instances
python3 -i /path/to/targets.txt -t 4

Support the developer

Liked the project? Donate a few bucks to motivate me to keep writing code for free.



You can contribute to this project by providing suggestions, reporting sensible issues and spreading the word. Pull requessts for the following will not be accepted:

  • Typos
  • coDe qUaLiTY
  • Docker and .gitignore file
You can’t perform that action at this time.