A modern, fast port scanner with a scripting engine that can scan all 65k ports in 3 seconds.
RustScan is a high-performance port scanner written in Rust that finds open ports on network hosts extremely quickly. It solves the problem of slow traditional port scans by completing full 65k-port scans in seconds, then provides extensibility through a scripting engine to automate follow-up actions like Nmap analysis.
Security professionals, penetration testers, network administrators, and developers who need fast network reconnaissance and port discovery as part of security assessments or infrastructure monitoring.
Developers choose RustScan for its unmatched speed, lightweight design, and powerful scripting capabilities that integrate seamlessly into existing security workflows, offering a modern alternative to slower traditional scanners.
🤖 The Modern Port Scanner 🤖
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Uses optimized Rust code to scan all 65,535 ports in as little as 3 seconds, with performance continuously monitored via HyperFine to ensure speed improvements.
Supports Python, Lua, and Shell scripts to automate post-scan actions, such as piping results into Nmap for detailed analysis or running custom security checks.
One of the first penetration testing tools designed with accessibility in mind, featuring CI testing to ensure it can be used by everyone, addressing industry gaps.
Automatically pipes discovered ports into Nmap for service and version detection, streamlining workflows without manual intervention.
Only officially supports Cargo installations, requiring Rust setup; other package managers like Homebrew or Arch are community-maintained and may have inconsistencies.
Lacks built-in service detection, forcing dependence on Nmap or custom scripts for comprehensive analysis, which adds setup complexity and toolchain overhead.
Prioritizes speed over stealth, making scans easily detectable by IDS/IPS; slow scan options exist but are not the primary focus, limiting covert operations.
Usage guides and features are split across multiple wiki pages, which can be harder to navigate and may lack cohesion for new users.