A CLI that takes a list of domains and scans their IP addresses, ports, vhosts, web paths, and JS files in parallel.
WARNING: don't use this tool to scan hosts you aren't authorized to scan!
Clone the repo, cd
into it, and git submodule update --init
.
sc4n
requires Python3, ffuf, hakrawler, and nmap so make sure they're installed.
_______________________________________/\\\__________________
_____________________________________/\\\\\__________________
___________________________________/\\\/\\\__________________
__/\\\\\\\\\\_____/\\\\\\\\______/\\\/\/\\\_____/\\/\\\\\\___
_\/\\\//////____/\\\//////_____/\\\/__\/\\\____\/\\\////\\\__
_\/\\\\\\\\\\__/\\\__________/\\\\\\\\\\\\\\\\_\/\\\__\//\\\_
_\////////\\\_\//\\\________\///////////\\\//__\/\\\___\/\\\_
__/\\\\\\\\\\__\///\\\\\\\\___________\/\\\____\/\\\___\/\\\_
_\//////////_____\////////____________\///_____\///____\///__
Pr0grammed by zbo14 with 🤖 and ❤️
USAGE: ./sc4n [OPTIONS] [file]
OPTIONS:
-h log usage information and exit
-n number of scanner processes to spawn (default: nproc)
-o path to output directory
-p number of top ports to scan (default: 1000)
-q don't print banner or info
-w wordlist for web paths (default: ./lists/paths.txt)
-z wordlist for virtual hosts (default: ./lists/hosts.txt)
sc4n
accepts a regular file with 1 domain per line, otherwise it reads domains from stdin.
nmap
requires root privileges to run a SYN scan. To avoid having to repeatedly enter your password, you can add the following to /etc/sudoers
(or a file in /etc/sudoers.d/
) with visudo
:
<user> ALL=NOPASSWD: /usr/bin/nmap
WARNING: be careful not to corrupt the file!