Tools
| Tool | Speed | URL | Ideal Use |
|---|---|---|---|
| Nmap | Medium | https://nmap.org | Complete scan with OS and service detection |
| Masscan | Very fast | https://github.com/robertdavidgraham/masscan | Internet-scale port sweeps |
| RustScan | Very fast | https://github.com/RustScan/RustScan | Fast initial discovery, then hand off to Nmap |
| Nuclei | Template-based | https://github.com/projectdiscovery/nuclei | Automated vulnerability detection via templates |
Speed comparison
Recommended workflow
Passive recon first
Check Shodan and Censys for already-indexed results on the target IP range before running active scans.
Fast port discovery with RustScan
Use RustScan to identify open ports in seconds, then pass the discovered port list to Nmap for deeper analysis.
Service and version detection with Nmap
Run Nmap with
-sV and -sC flags against the ports identified by RustScan for OS fingerprinting and service banner grabbing.