This project is a high-performance network discovery and security auditing tool developed in C++. It utilizes raw sockets to gather in-depth information about target systems, including open ports and operating system details.
Blazing Fast Multithreaded Scanning: Efficiently scans a target IP for open TCP and UDP ports using a multithreaded architecture.
Advanced OS Fingerprinting: Goes beyond simple TTL checks. It analyzes the unique signatures of inbound packets, including TCP Window Size and TCP Options, to provide a highly accurate OS guess.
Low-Level Network Interaction: Crafts and dissects custom TCP/IP packets at the byte level, demonstrating a deep understanding of network protocols.
C++: Chosen for its power and direct access to system resources.
Winsock (Windows Sockets 2): The core API for networking on Windows.
Raw Sockets: Enables the creation of custom packets, a fundamental technique in network security and analysis.
This software is for educational and ethical research purposes only. The developer takes no responsibility for any illegal or malicious use.
Administrator Privileges: Raw sockets require administrative access to run.
Legal Warning: Scanning networks without explicit permission is illegal in many jurisdictions. Only use this tool on networks you own or have permission to scan.
Ethical Use: The power of this tool comes with a great responsibility. Please use it ethically to enhance security, not to compromise it.
The user assumes all liability for the use of this program.
Prerequisites A Windows machine with administrator privileges.
A C++ compiler (e.g., Visual Studio 2019+).
Compilation Clone the repository.
Open the project in Visual Studio.
Build the project in Release mode.
Run the compiled executable from a Command Prompt with administrator rights, providing the target IP address as a command-line argument.
PortScanner.exe <IP_Address>
We welcome contributions! Please open an issue or submit a pull request if you have ideas for improvements.
This project is licensed under MIT license.