OffScan is a command-line tool developed in Rust for network exploration, device and service enumeration, and offensive security testing on Linux. It provides a compact, efficient interface for scanning, probing, and capturing network data, aimed at defenders and red‑teamers alike. What it can do:
| Offensive Tests | Network Exploration |
|---|---|
|
|
Warning
The code is primarily designed for Linux systems. While it can run on Windows via WSL (Windows Subsystem for Linux), network interface limitations in WSL may restrict functionality and cause unreliable behavior.
This project uses Cargo, Rust's package manager and build system, to manage its Rust dependencies.
If you don't have Cargo installed, follow the steps on the official Rust installation page.
All Rust dependencies are managed automatically by Cargo — no manual installation required.
You can find them listed in the Cargo.toml file.
Important
In addition to Cargo-managed crates, this project requires some system-level dependencies:
- A C compiler and linker (
build-essentialhas everyting) — required to build and link Rust binaries. libpcap-dev— required for network packet capture.iwcommand — required for wireless interface controll.
Make sure these are installed before building.
This project is licensed under the MIT License. See the LICENSE file for deta