Skip to content

olivercalazans/offscan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OffScan

OffScan is a command-line tool developed in Rust for network exploration, device and service enumeration, and offensive security testing on Linux. It provides a compact, efficient interface for scanning, probing, and capturing network data, aimed at defenders and red‑teamers alike. What it can do:


Offensive Tests Network Exploration
  • 802.11 Authentication Flooding
  • DNS Amplification Flooding
  • Ping Flooding
  • TCP Flooding
  • Protocol Tunneling test
  • Banner Grabbing
  • Network Mapping
  • Port Scanning
  • Wifi Mapping

Warning

The code is primarily designed for Linux systems. While it can run on Windows via WSL (Windows Subsystem for Linux), network interface limitations in WSL may restrict functionality and cause unreliable behavior.


Dependencies

This project uses Cargo, Rust's package manager and build system, to manage its Rust dependencies.
If you don't have Cargo installed, follow the steps on the official Rust installation page.

All Rust dependencies are managed automatically by Cargo — no manual installation required.
You can find them listed in the Cargo.toml file.

Important

In addition to Cargo-managed crates, this project requires some system-level dependencies:

  • A C compiler and linker (build-essential has everyting) — required to build and link Rust binaries.
  • libpcap-dev — required for network packet capture.
  • iw command — required for wireless interface controll.

Make sure these are installed before building.


License

This project is licensed under the MIT License. See the LICENSE file for deta