ChikiRustyScan — a Port Scanner in Rust for Hackers
May 2, 2025 - ⧖ 2 min⚙️ “Hello, World” for Hackers.
ChikiRustyScan is not just a tool — it's a teaching companion.
Designed by hackers, for hackers, to learn Rust with purpose.
🛠️ Why I Built It
ChikiRustyScan was born in my lab — a space of neon terminals, broken packet captures, and curiosity.
I needed a small, clean codebase to teach and demo the basics of:
- Socket programming in Rust
- Threading and concurrency with control
- Fast feedback loops for CTFs
- Use when pivoting!
Think of it as nmap's baby sibling, one you can read and fully understand over a single cup of ☕
🚀 Features
-
✅ Multi-threaded scanning
Scan ports in parallel. Default thread count is 2. -
✅ Single-port targeting
Test port 1337, 22, or any you want specifically. -
✅ Full sweep from 1–8024
By default or with--all
, it scans a wide range in seconds. -
✅ Sane defaults
No args? It runs:
./chikirustyscan
Defaults to:
threads = 2
address = 127.0.0.1
mode = all ports
🧪 Use Cases
- 🔓 Quick port checks during CTFs
- 🔍 Lab validation during exploit dev
- 💡 Teaching threading + sockets in Rust
💻 Get It
Project source hosted on SourceHut:
👉 ChikiRustyScan Git Repository
Clone and build it:
git clone https://git.sr.ht/~rek2/ChikiRustyScan
cd ChikiRustyScan
cargo build --release
🧠 Final Thoughts
This is just the beginning.
ChikiRustyScan can be forked, mutated, and extended — add banner grabbing, service detection, or async networking.
Rust is a powerful weapon in the hacker's arsenal.
This is one of the first blades I forged with it.
Stay tuned for more tools, tactics, and source-level adventures.
-- ReK2