⚠️ Disclaimer Valkan is a real tool, developed for legitimate network scanning and vulnerability exploitation activities in controlled and authorized environments. Its use is exclusively for offensive security testing and auditing purposes with explicit permission. Unauthorized or illegal use is prohibited by applicable laws, including the Marco Civil da Internet (Law No. 12,965/2014). The author is not responsible for any misuse or damage caused by this tool.
This project provides a functional tool for:
- Network scanning on ports 1–1024 or full range, detecting open services and potential vulnerabilities.
- Modular engine with components such as Reporter, Detector, HTTP module, and CLI-based terminal interface.
- Built in Go (Golang) for high performance, concurrent scanning, and low memory usage.
- Designed for real-world offensive security assessments in authorized and controlled environments.
-
Language: Go (Golang)
-
Core Libraries & Modules:
cobra– CLI framework for structured command-line interfacesnet– Network operations (TCP/UDP scanning, IP resolution)http– HTTP requests and header/banner grabbingos– OS-level access for system interaction and info gatheringos/exec– Execution of system commands when necessaryfmt– Terminal output formattingencoding/json– JSON output for structured reportingruntime– System architecture and OS detectiontime– Timeout handling, scan delays, and timestamping
The architecture is modular, concurrent, and extensible, designed for flexibility and performance in real-world security assessments:
-
🔎 Scanner Module
Performs port scanning (range:1–1024or1–65535) using concurrent routines for fast network enumeration. -
🧠 Detector Module
Analyzes open ports and services, performs banner grabbing, and identifies potential vulnerabilities or weak configurations. -
📝 Reporter Module
Outputs results in structured formats (e.g., console, JSON), enabling easy parsing and documentation of scan results. -
🌐 HTTP Module
Sends requests to web services to extract HTTP headers, status codes, server info, and other metadata. -
💻 CLI Interface
Built withcobrato provide a clean and interactive command-line experience. -
⚙️ System Info Layer
Detects system architecture, OS type, kernel version, and other relevant environment data. -
📦 Future Web UI (In Development)
A user-friendly web dashboard is under development (started on2025-09-06) for managing scans and visualizing results.
Contributions are welcome, provided they align with the educational goals of the project.
If you find bugs, have ideas for improvements, or want to add features, feel free to contribute via pull requests.
To contribute:
- Fork the repository.
- Create a branch with your changes.
- Submit a pull request with a detailed description of your changes.
This project is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0).
See the LICENSE file for details.
- Contact the author via GitHub
⚠️ Final Notice: This project is intended for research, testing, and development purposes in controlled environments only. Do not use this code in production systems, unauthorized networks, or for malicious activities. The author explicitly disclaims any responsibility for misuse and condemns any form of unethical or illegal usage.