Skip to content

SteveTheKiller/KillerScan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

KillerScan

Fast network scanner built for field techs. ARP + ping discovery, port probing, active fingerprinting (HTTP title, SSH banner, TLS cert, NetBIOS, SNMP), vendor lookup via OUI, and weighted-score device classification. Single portable EXE, ~865 KB zipped, no runtime install required.

Part of killertools.net.

Features

  • Self-installer: launch the EXE to install to %LOCALAPPDATA%\Programs\KillerScan\ with Start Menu and optional desktop shortcut, or just run it portable with no install
  • ARP cache + parallel ping sweep for fast discovery; second ARP pass after sweep catches phones and devices that block ICMP
  • TCP port scan across 24 common service ports with 200ms timeout
  • Active fingerprinting: HTTP title/Server header, SSH banner, TLS cert subject, NetBIOS name (UDP 137), SNMPv1 sysDescr (UDP 161), ICMP TTL
  • MAC OUI vendor identification against the IEEE registry
  • Weighted-score classifier identifies hypervisors, Windows boxes, Linux servers, printers, NAS, network gear, cameras, IoT, mobile, Home Assistant, and more
  • Right-click to copy IP/MAC/hostname, launch RDP/SSH/browser, or override device type
  • CSV and HTML export

Requirements

  • Windows 10 or 11 (x64)
  • No runtime install. Everything needed is inside the EXE (targets .NET Framework 4.8, which ships with every supported Windows release).
  • Run as admin for best ARP results on some networks

Download

Build from source

git clone https://github.com/SteveTheKiller/KillerScan.git
cd KillerScan
dotnet publish -c Release

Output lands in bin/Release/net48/publish/. The publish step produces a single Costura-bundled KillerScan.exe plus a versioned KillerScan-<version>-src.zip for GPL3 source distribution.

Requires the .NET 8 SDK or later to build (even though the output targets .NET Framework 4.8).

Changelog

See CHANGELOG.md.

How classification works

The classifier accumulates points from every signal (open ports, OUI vendor, hostname keywords, HTTP title, SSH banner, TLS subject, SNMP description, NetBIOS name, TTL) and picks the highest-scoring type above a threshold. This replaces brittle first-match port rules and avoids false positives like "my coworker's laptop is a hypervisor because port 2179 is open."

See Services/NetworkScanner.csClassifyDevice for the scoring table.

License

GPLv3. See LICENSE. If you fork, modify, or redistribute KillerScan, your version must also be released under GPLv3 with source available. No exceptions for commercial rebrands.

About

Fast network scanner for field techs. ARP + ping discovery, port probing, active fingerprinting (HTTP, SSH, TLS, NetBIOS, SNMP), and weighted-score device classification in a single portable Windows exe.

Topics

Resources

License

Stars

Watchers

Forks

Contributors