A modern, fast port scanner with a scripting engine and adaptive learning, capable of scanning all 65k ports in 3 seconds.
RustScan is a high-performance port scanner designed to find open ports on networked devices extremely quickly. It solves the problem of slow traditional port scans by leveraging Rust's speed to scan all 65,535 ports in about 3 seconds, then integrates with tools like Nmap for further analysis.
Security professionals, penetration testers, network administrators, and developers who need fast, reliable port scanning for security assessments, network audits, or troubleshooting.
Developers choose RustScan for its unmatched speed, extensible scripting engine, and intelligent adaptive learning that improves with use, offering a modern alternative to slower, less flexible port scanners.
🤖 The Modern Port Scanner 🤖
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Uses optimized Rust code to scan all 65,535 ports in as little as 3 seconds, with continuous integration tests ensuring performance doesn't regress, as highlighted in the README's speed section.
Supports custom scripts in Python, Lua, or Shell, allowing automated workflows like piping results into Nmap or running post-scan actions, which is demonstrated in the extensibility examples.
Automatically pipes discovered open ports into Nmap for detailed service and version detection, streamlining the reconnaissance pipeline as a core feature mentioned in the key features.
Built with accessibility as a core requirement, including CI testing to ensure usability for all, addressing a noted gap in penetration testing tools according to the README.
Lacks built-in service detection and vulnerability scanning, requiring Nmap for full analysis, which adds complexity and external dependencies to the workflow.
The adaptive learning feature is described vaguely as 'basic maths' with limited documentation, relying on a wiki for specifics, which may hinder user understanding and customization.
While optimized for speed, real-world factors like network latency or firewall rules can reduce effectiveness, and the focus on speed might compromise stealth in default configurations.