QuickScan alternatives

Looking for an alternative tool to replace QuickScan? During the review of QuickScan we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. DMitry (information gathering tool)
  2. Masscan (high-performance port scanner)
  3. portSpider (network vulnerability scanner)

These tools are ranked as the best alternatives to QuickScan.

Alternatives (by score)

63

DMitry

Introduction

This small utility can retrieve information from the WHOIS database, to see who owns an IP address or domain name. Besides that, it can obtain information from the system itself, like the uptime. DMitry also has the option to search for email addresses, perform a TCP port scan, and use modules specified by the user.

Project details

DMitry is written in C.

Strengths and weaknesses

  • + The source code of this software is available

    DMitry review

    60

    Masscan

    Introduction

    Masscan can be compared with other tools like Nmap. Due to its focus on high performance, this tool can be used when many systems have to be scanned at once. It can scan all internet hosts on IPv4 within 5 minutes. This impressive statistic makes the tool loved by those that do security research.

    Project details

    Masscan is written in C.

    Strengths and weaknesses

    • + More than 25 contributors
    • + More than 8000 GitHub stars
    • + The source code of this software is available

      Typical usage

      • Network scanning

      Masscan review

      64

      portSpider

      Introduction

      portSpider is a security tool to scan network ranges and find open ports. The goal of the tool is to find vulnerable services.

      Project details

      portSpider is written in Python.

      Strengths and weaknesses

      • + The source code of this software is available

        Typical usage

        • Network scanning
        • Vulnerability scanning

        portSpider review

        63

        Zenmap

        Introduction

        Zenmap is a graphical user interface (GUI) for Nmap. It can be of great help to start a network scan by simply selecting the options you want. Besides Linux, it also runs on Microsoft Windows, macOS, BSD, and other flavors of Unix.

        One of the strengths of Zenmap is the ability to store profiles, which can be reused for later scans. The command creator is another one, which helps interactively create the right nmap commands. Recent scans are stored in a searchable database and scan results can be saved and compared.

        Project details

        Zenmap is written in Python.

        Strengths and weaknesses

        • + The source code of this software is available
        • + Well-known tool

          Typical usage

          • Network scanning
          • Penetration testing
          • Port scanning
          • Security assessment

          Zenmap review

          78

          Nmap

          Introduction

          Nmap is short for "Network Mapper". It is a free and open source utility for network discovery and security auditing. It was release in September of 1997 by Gordon Lyon, commonly known under his pseudonym "Fyodor".

          Project details

          Nmap is written in C, C++, Lua, Python.

          Strengths and weaknesses

          • + Project is mature (10+ years)
          • + The source code of this software is available
          • + Well-known author
          • + Well-known tool
          • - Software usage is restricted (e.g. commercially)

          Typical usage

          • Network scanning
          • Vulnerability scanning

          Nmap review

          76

          aiodnsbrute (Async DNS Brute)

          Introduction

          When a project requires resolving or guessing host names, then this tool is a great addition to the toolkit. It focuses on 'fast' by using asynchronous operations. The list of names to try is provided with a wordlist.

          Project details

          aiodnsbrute is written in Python.

          Strengths and weaknesses

          • + Very low number of dependencies
          • + The source code of this software is available

            Typical usage

            • Network scanning
            • Penetration testing

            aiodnsbrute review

            63

            DNSChef

            Introduction

            DNSChef is a DNS proxy that can be used terminate or intercept traffic for DNS traffic. This might be useful during a penetration test or when researching malware and manipulate the actual DNS responses.

            Project details

            64

            DNSteal

            Introduction

            DNSteal allows you to extract files from a machine through DNS requests. This can be used to circumvent security measures and test them against data leakage. The tool supports compression and allows for multiple files to be transferred.

            Project details

            DNSteal is written in Python.

            Strengths and weaknesses

            • + More than 500 GitHub stars
            • + The source code of this software is available
            • - No releases on GitHub available
            • - Full name of author is unknown

            Typical usage

            • Application security
            • Data hiding

            DNSteal review

            85

            Fierce

            Introduction

            Fierce is a security tool that helps with DNS reconnaissance. It can locate non-contiguous IP space, but using DNS information.

            Project details

            Fierce is written in Python.

            Strengths and weaknesses

            • + The source code of this software is available

              Typical usage

              • Information gathering
              • Reconnaissance
              • Security assessment

              Fierce review

              60

              SubBrute (subdomain-bruteforcer)

              Introduction

              SubBrute is a DNS meta-query spider that enumerates DNS records and subdomains. This can be useful during penetration tests and security assessments.

              Project details

              SubBrute is written in Python.

              Strengths and weaknesses

              • + More than 1000 GitHub stars
              • + The source code of this software is available
              • - Full name of author is unknown

              Typical usage

              • Information gathering
              • Penetration testing
              • Security assessment

              SubBrute review

              60

              SubFinder

              Introduction

              SubFinder is a tool to scan domains and discover subdomains. This may be useful during the reconnaissance phase of penetration testing where information is collected. Some subdomains may reveal sensitive data or point to interesting targets such as a backup location.

              Project details

              SubFinder is written in Golang.

              Strengths and weaknesses

              • + Tool is modular and extendable
              • + More than 500 GitHub stars
              • + The source code of this software is available

                Typical usage

                • Discovery of sensitive information
                • Information gathering
                • Penetration testing
                • Reconnaissance
                • Security assessment

                SubFinder review

                60

                Leviathan Framework

                Introduction

                Leviathan is a security tool to provide a wide range of services including service discovery, brute force, SQL injection detection, and exploit capabilities. The primary reason to use this tool is to do massive scans on many systems at once. For example to include a huge network range, country-wide scan, or even full internet scan.

                Project details

                Leviathan Framework is written in Python.

                Strengths and weaknesses

                • + More than 500 contributors
                • + The source code of this software is available

                  Typical usage

                  • Penetration testing
                  • Security assessment
                  • Service exploitation

                  Leviathan Framework review

                  63

                  Portspoof

                  Introduction

                  Portspoof is a small utility with the goal to make port scanning by other much harder. It achieves this by showing all configured TCP ports to be in the 'open' state instead of closed or filter. The related ports are also emulating valid services. This way a port scan on the system will reveal many open ports and look to have legitimate services running.

                  Project details

                  64

                  Th3inspector

                  Introduction

                  This tool can be called a true 'inspector tool' as it helps to discover many types of data.

                  • Website information
                  • Domain and subdomain information
                  • Mail server information and email
                  • Phone details
                  • IP addresses
                  • Detection of used CMS

                  Project details

                  Th3inspector is written in Perl.

                  Strengths and weaknesses

                  • + The source code of this software is available
                  • - No releases on GitHub available

                  Typical usage

                  • Discovery of sensitive information
                  • Information gathering

                  Th3inspector review

                  60

                  ThreatPinch Lookup

                  Introduction

                  ThreatPinch helps to speed up collecting information from common resources like CVE databases or public WHOIS data. As it works from the browser, it is a helpful addition for people who have to perform forensics, security monitoring, or system administration. For example, getting the owner of a domain and IP address becomes almost instant knowledge.

                  Project details

                  ThreatPinch Lookup is written in JavaScript.

                  Strengths and weaknesses

                  • + Many integration possibilities available
                  • - Unknown project license

                  Typical usage

                  • Information gathering
                  • Threat hunting

                  ThreatPinch Lookup review

                  Some relevant tool missing as an alternative to QuickScan? Please contact us with your suggestion.