A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
The tool uses a single raw socket file descriptor with default buffer size (net.ListenPacket with 4096 bytes) in user space to send out packets. This is slower but useful as the kernel automatically fills up lower network layers in the OSI stack.
The performances can be improved by increasing the outgoing buffer size in user space or by implementing kernel bypass techniques (direct system calls or with technologies mentioned in https://github.com/projectdiscovery/naabu/issues/337)
Please describe your feature request:
The tool uses a single raw socket file descriptor with default buffer size (
net.ListenPacket
with 4096 bytes) in user space to send out packets. This is slower but useful as the kernel automatically fills up lower network layers in the OSI stack. The performances can be improved by increasing the outgoing buffer size in user space or by implementing kernel bypass techniques (direct system calls or with technologies mentioned in https://github.com/projectdiscovery/naabu/issues/337)Improvements
Changes to implement