Blazing fast TCP port scanner with multi-source vulnerability lookup
Features β’ Installation β’ Usage β’ Demo β’ Legal β’ Website β’ Discord
10x faster than traditional scanners with real-time vulnerability intelligence
- β‘ Insane Speed: Multi-threaded scanning with optimized presets (slow/normal/fast/aggressive)
- π Smart Detection: Banner grabbing + TLS cert parsing + version fingerprinting
- π‘οΈ Vuln Intelligence: Aggregates CVEs from NVD + CIRCL + Exploit-DB in real-time
- π Beautiful Reports: Export to HTML/JSON with clickable CVE links
- π Range Scanning: CIDR notation + host discovery (ping sweep)
- π¨ Clean UI: Color-coded terminal output + verbose mode
- Full Port Scan (1-65535) with intelligent timeout scaling
- Top 1000 Ports for quick reconnaissance
- Custom Port Ranges (e.g.,
80,443,8000-8100) - IP Range Discovery with CIDR support (
192.168.1.0/24)
- Banner grabbing for service detection
- TLS/SSL certificate parsing (issuer, expiry, SANs)
- HTTP header analysis + server fingerprinting
- MySQL version extraction from banners
- π΄ NVD (National Vulnerability Database)
- π’ CIRCL (cve.circl.lu)
- π‘ Exploit-DB (offensive-security repo)
- JSON reports with structured data
- HTML reports with embedded CVE links
- Timestamp + scan metadata
- Python 3.8 or higher
- Windows/Linux/macOS
# Clone the repository
git clone https://github.com/ctxzero/PortHunt.git
cd PortHunt
# Create virtual environment
python -m venv .venv
# Activate venv
# Windows PowerShell:
.\.venv\Scripts\Activate.ps1
# Linux/Mac:
source .venv/bin/activate
# Install dependencies
pip install -r requirements.txt
# Run PortHunt
python PortHunt.pypython PortHunt.pyMenu Options:
- Scan All Ports - Full TCP scan (1-65535)
- Scan Top Ports - Quick scan of 1000 most common ports
- Custom Port Range - User-defined ports (e.g.,
22,80,443,8000-9000) - IP Range Scan - CIDR/range with host discovery (
192.168.1.0/24) - Toggle Verbose - Debug logging
- Exit
- slow β High accuracy, low noise (pentests, strict firewalls)
- normal β Balanced (default, recommended)
- fast β Quick recon (CTFs, time-limited)
- aggressive β Maximum speed (controlled environments only)
# Start PortHunt
python PortHunt.py
# Select option 2 (Top Ports)
[2] Scan Top Ports
# Enter target
Enter target IP address or hostname: scanme.nmap.org
# Choose preset
Choose Preset (slow, normal, fast, aggressive) [default: normal]: fast
# Review results + vulnerability intelligence
Search public vulnerability databases? (y/N): y
# Export report
Save scan + vuln report? (y/N): y
Format (json/html/both) [both]: bothStarting Top-1000 port scan on 45.33.32.156 (scanme.nmap.org) using preset 'fast'...
Discovery complete. 4 open ports found: [22, 80, 443, 9929]
PORT SERVICE INFO/VERSION
22/tcp SSH SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13
80/tcp HTTP Apache/2.4.7 (Ubuntu)
443/tcp HTTPS/TLS Apache/2.4.7; TLS cert: CN=scanme.nmap.org
9929/tcp Unknown Service no response
Vulnerability lookup results
Port 80/tcp Service: HTTP Info: Apache/2.4.7 (Ubuntu)
Candidate: Apache 2.4.7
Source: NVD (3)
CVE-2017-9798 (2017-09-18)
Apache HTTP Server 2.2.0 - 2.4.33: Use-after-free via Limit directive...
FOR EDUCATIONAL AND AUTHORIZED TESTING ONLY
- β Do: Test systems you own or have explicit written permission to scan
- β Do: Use in authorized penetration tests, CTFs, lab environments
- β Don't: Scan public infrastructure without permission (illegal in most jurisdictions)
- β Don't: Use for malicious purposes or unauthorized access attempts
The author assumes NO liability for misuse. You are responsible for compliance with local laws.
- Discovery Phase: Parallel TCP SYN connect with timeout scaling
- Probing Phase: Banner grabbing + TLS handshake + HTTP HEAD requests
- Vuln Phase: Async API queries with rate-limiting + caching (
@lru_cache)
| Preset | Timeout | Workers | Typical Speed (1000 ports) |
|---|---|---|---|
| slow | 600ms | 40 | ~30s |
| normal | 200ms | 200 | ~8s |
| fast | 120ms | 320 | ~4s |
| aggressive | 60ms | 450 | ~2s |
Speeds vary based on network conditions, target responsiveness, and firewall rules
Contributions welcome! Ideas:
- Add more vulnerability sources (Vulners, OSV, GitHub Advisories)
- UDP scanning module
- Service-specific probes (SMB, RDP, databases)
- CLI argument parser (argparse)
- Dockerfile + CI/CD
- π Website: https://ctxzero.dev/PortHunt
- π¬ Discord: https://discord.gg/KqVkdYN6yr
- π Issues: https://github.com/ctxzero/PortHunt/issues
- β Star this repo if it helped you!
MIT License - see LICENSE file
ctxzero
- Inspired by nmap, masscan, and the infosec community
- Vulnerability data provided by NVD, CIRCL, and Exploit-DB
β Star this repo if PortHunt helped you!
Made with β€οΈ for the red team community

