You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+37-15Lines changed: 37 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ A fast TCP port scanner written in Go, with optional service/version detection,
4
4
5
5
## Current scope
6
6
7
-
- Fast concurrent TCP connect scanning.
7
+
- Fast concurrent TCP scanning with selectable engine (`connect` or `syn`).
8
8
- Optional service and version detection (`-s`).
9
9
- Single host, hostname, comma-separated targets, and CIDR ranges.
10
10
- CIDR active-host discovery by TCP probes (no ICMP ping).
@@ -51,6 +51,9 @@ go install github.com/NexusFireMan/gomap/v2@latest
51
51
# Default scan (top common ports)
52
52
./gomap 10.0.11.6
53
53
54
+
# Native SYN scan discovery (requires root/CAP_NET_RAW)
55
+
./gomap --scan-type syn 10.0.11.6
56
+
54
57
# Service/version detection on selected ports
55
58
./gomap -s -p 21,22,80,135,139,445,5985 10.0.11.6
56
59
@@ -78,6 +81,7 @@ Usage:
78
81
79
82
Main options:
80
83
-p ports to scan (example: 80,443 or 1-1024 or - for all)
84
+
--scan-type connect|syn (default: connect)
81
85
--top, --top-ports scan top N ports from curated top-1000 list
82
86
--exclude-ports remove ports from final scan set
83
87
-s enable service/version detection
@@ -128,40 +132,58 @@ When `-s` is enabled, gomap combines port-based hints and protocol/banner parsin
128
132
- SSH/FTP/PostgreSQL/Redis/MySQL and other protocol banners.
129
133
- SMB-oriented identification for `microsoft-ds` targets.
130
134
131
-
Important: banner-based detection is heuristic. Always validate critical findings with a second tool (`nmap -sV`, native service queries, or manual protocol checks).
135
+
Important: banner-based detection is heuristic. Always validate critical findings with a second tool.
136
+
137
+
`--scan-type syn` notes:
138
+
- Uses GoMap native raw TCP SYN probes for port discovery, then optional service detection on open ports.
139
+
- If SYN scan cannot run (insufficient privileges or unsupported OS), GoMap falls back to `connect` scan automatically.
140
+
- For noisy links, tune reliability explicitly with `--retries` and `--rate`.
132
141
133
142
Note: `--random-ip` randomizes HTTP headers only; it does not spoof the real TCP source IP.
134
143
135
144
## Stealth benchmark (lab)
136
145
137
-
Benchmark executed on **February 25, 2026** with:
146
+
Benchmark executed on **March 9, 2026** with:
138
147
139
148
- Scanner host: `10.0.11.11`
140
-
- Targets: `10.0.11.0/24` (Metasploitable3 Windows `10.0.11.6`, Linux `10.0.11.9`, Snort `10.0.11.8`)
149
+
- Targets: `10.0.11.0/24` (Windows `10.0.11.6`, Linux `10.0.11.9`, Snort `10.0.11.8`)
0 commit comments