🗺️ Network scanning & recon
RustScan
Modern port scanner that pipes results straight into Nmap.
Beginner
⏱ 10 minutes 💸 Free GPLv3
Why use it
RustScan finds open ports faster than Nmap, then automatically pipes them into Nmap for proper service detection. The best of both worlds with zero loss of capability.
What you get
- Fast async TCP port discovery
- Auto-Nmap follow-up with the discovered ports
- Adaptive rate limiting
- Scripted output via Lua
System requirements
| Cpu | 1 core |
|---|---|
| Ram | 256 MB |
| Disk | 20 MB |
| Os | Linux, macOS, Windows |
| Docker | Yes |
Installation
cargo install rustscan if you have Rust, or grab a release binary. Run with: rustscan -a 192.168.1.10 -- -A -sV — anything after the -- goes to Nmap.
Suggested configuration
Set --ulimit 5000 on Linux for fast scans without exhausting file descriptors. Use --accessible mode if you need machine-readable output. For heavy ranges, prefer Masscan first.
Integration ideas
- Pipes natively into Nmap
- Combine with Nuclei for vuln confirmation
Alternatives
- Naabu — ProjectDiscovery alternative; pairs well with their other tools.
- Masscan — Faster for very large ranges.
Cyentrix verdict
Worth installing as a quality-of-life upgrade if you use Nmap daily. Saves real time on small to medium scopes.