Skip to main content

Quick Installation

Get scan4all running in just a few steps.
1

Install Dependencies

scan4all requires libpcap library for packet capture:
sudo apt update
sudo apt install -y libpcap0.8-dev
2

Download scan4all

Download the latest release for your platform:
# Linux (amd64)
wget https://github.com/GhostTroops/scan4all/releases/download/v2.8.9/scan4all_linux_amd64
chmod +x scan4all_linux_amd64
mv scan4all_linux_amd64 scan4all

# Or install via Go
go install github.com/GhostTroops/[email protected]
3

Run Your First Scan

Scan a single target:
./scan4all -host example.com -v

Your First Scans

Try these common scanning scenarios:
Scan a single host with default HTTP ports:
scan4all -host 192.168.1.1 -v

Understanding Output

scan4all provides detailed information about discovered services and vulnerabilities:
# Enable verbose mode for detailed output
scan4all -host example.com -v

# Monitor scan statistics
scan4all -host example.com -stats

# Silent mode (only show findings)
scan4all -host example.com -silent
Use -v (verbose) flag to see detailed progress and -stats to monitor scanning statistics in real-time.

Next Steps

Installation Guide

Complete installation instructions for all platforms

Usage Guide

Learn all CLI options and scanning techniques

Core Features

Explore vulnerability detection, password cracking, and more

Configuration

Configure scan4all for your specific needs
Always obtain proper authorization before scanning any systems you do not own. Unauthorized scanning may be illegal in your jurisdiction.

Build docs developers (and LLMs) love