Quick Installation
Get scan4all running in just a few steps.
Install Dependencies
scan4all requires libpcap library for packet capture: Ubuntu/Debian
CentOS/RHEL
macOS
sudo apt update
sudo apt install -y libpcap0.8-dev
Download scan4all
Download the latest release for your platform: # Linux (amd64)
wget https://github.com/GhostTroops/scan4all/releases/download/v2.8.9/scan4all_linux_amd64
chmod +x scan4all_linux_amd64
mv scan4all_linux_amd64 scan4all
# Or install via Go
go install github.com/GhostTroops/[email protected]
Run Your First Scan
Scan a single target: ./scan4all -host example.com -v
Your First Scans
Try these common scanning scenarios:
Single Host
Network Range
Multiple Targets
With Output
Scan a single host with default HTTP ports: scan4all -host 192.168.1.1 -v
Scan an entire subnet: scan4all -host 192.168.1.0/24 -v
Scan multiple targets from a file: echo "192.168.1.1" > targets.txt
echo "example.com" >> targets.txt
scan4all -list targets.txt -v
Save results to JSON format: scan4all -host example.com -json -o results.json
Understanding Output
scan4all provides detailed information about discovered services and vulnerabilities:
# Enable verbose mode for detailed output
scan4all -host example.com -v
# Monitor scan statistics
scan4all -host example.com -stats
# Silent mode (only show findings)
scan4all -host example.com -silent
Use -v (verbose) flag to see detailed progress and -stats to monitor scanning statistics in real-time.
Next Steps
Installation Guide Complete installation instructions for all platforms
Usage Guide Learn all CLI options and scanning techniques
Core Features Explore vulnerability detection, password cracking, and more
Configuration Configure scan4all for your specific needs
Always obtain proper authorization before scanning any systems you do not own. Unauthorized scanning may be illegal in your jurisdiction.