A fast, threaded ICMP + TCP SYN host discovery tool designed to identify live systems across large subnets while minimizing noisy traffic patterns that trigger basic IDS alerts.
This tool produces Nmap-ready host lists, clean reports, and supports large /16 or /24 range sweeps with high-speed concurrency.
ping-sweep/
βββ src/
β βββ ping_sweep.py
βββ wordlists/
β βββ .gitkeep
βββ reports/
β βββ .gitkeep
βββ README.md
βββ LICENSE
- ICMP ping for standard host discovery
- TCP SYN (default port 80) for hosts that block ICMP
- Works even in restricted or filtered environments
- Default 100 threads
- Handles large subnets quickly
- Optimized for recon and OSCP-style labs
Prevents linear scanning patterns often detected by IDS.
Track sweep progress with live percentage updates.
Automatically generates:
reports/nmap-list-<timestamp>.txt
Use directly:
nmap -sV -Pn -iL reports/nmap-list-*.txtAll results stored in reports/:
.txtβ simple host list.jsonβ structured host inventory.txt(Nmap list) β for immediate vulnerability scanning
python3 src/ping_sweep.py 192.168.1.0/24Progress: 57.20%
[+] Host Up: 192.168.1.10
[+] Host Up: 192.168.1.25
=== Scan Completed ===
Reports saved in /reports folder
reports/hosts-20251114-141200.txt
reports/hosts-20251114-141200.json
reports/nmap-list-20251114-141200.txt
A lightweight ICMP echo request:
ping -c 1 -W 1 <IP>
Quiet, fast, and reliable.
If ICMP fails, the script opens a TCP connection:
sock.connect((ip, 80))Many networks allow TCP even when ping is blocked.
The list of IPs is shuffled to avoid sequential scanning patterns.
100 worker threads pull IPs from a queue for rapid enumeration.
Results are saved into TXT, JSON, and Nmap formats automatically.
Subnet: 10.0.0.0/24 (254 hosts)
Threads: 100
| Probe Type | Avg Time |
|---|---|
| ICMP only | ~3.8 seconds |
| ICMP + TCP fallback | ~5.1 seconds |
Speed varies by network latency and firewall behavior.
- ARP sweep mode (local network)
- Masscan integration
- Custom TCP port selection
- Passive sniffing mode
- OS fingerprint hints via TTL analysis
This tool is intended for authorized penetration testing and educational use only. Scanning networks that you do not own or have explicit permission to test is illegal.
Vignesh Mani Offensive Security Researcher GitHub: https://github.com/vigneshoffsec LinkedIn: https://linkedin.com/in/vignesh-m17
