ChikiRustyScan — a Port Scanner in Rust for Hackers

⚙️ “Hello, World” for Hackers.
ChikiRustyScan is not just a tool — it's a teaching companion.
Designed by hackers, for hackers, to learn Rust with purpose.


🛠️ Why I Built It

ChikiRustyScan was born in my lab — a space of neon terminals, broken packet captures, and curiosity.
I needed a small, clean codebase to teach and demo the basics of:

  • Socket programming in Rust
  • Threading and concurrency with control
  • Fast feedback loops for CTFs
  • Use when pivoting!

Think of it as nmap's baby sibling, one you can read and fully understand over a single cup of ☕


🚀 Features

  • Multi-threaded scanning
    Scan ports in parallel. Default thread count is 2.

  • Single-port targeting
    Test port 1337, 22, or any you want specifically.

  • Full sweep from 1–8024
    By default or with --all, it scans a wide range in seconds.

  • Sane defaults
    No args? It runs:

./chikirustyscan

Defaults to:

threads = 2  
address = 127.0.0.1  
mode = all ports

🧪 Use Cases

  • 🔓 Quick port checks during CTFs
  • 🔍 Lab validation during exploit dev
  • 💡 Teaching threading + sockets in Rust

💻 Get It

Project source hosted on SourceHut:

👉 ChikiRustyScan Git Repository

Clone and build it:

git clone https://git.sr.ht/~rek2/ChikiRustyScan  
cd ChikiRustyScan  
cargo build --release

🧠 Final Thoughts

This is just the beginning.
ChikiRustyScan can be forked, mutated, and extended — add banner grabbing, service detection, or async networking.

Rust is a powerful weapon in the hacker's arsenal.
This is one of the first blades I forged with it.

Stay tuned for more tools, tactics, and source-level adventures.

-- ReK2