ChikiRustyScan β a Port Scanner in Rust for Hackers
May 2, 2025 - ⧖ 2 minβοΈ βHello, Worldβ for Hackers.
ChikiRustyScan is not just a tool β it's a teaching companion.
Designed by hackers, for hackers, to learn Rust with purpose.
π οΈ Why I Built It
ChikiRustyScan was born in my lab β a space of neon terminals, broken packet captures, and curiosity.
I needed a small, clean codebase to teach and demo the basics of:
- Socket programming in Rust
- Threading and concurrency with control
- Fast feedback loops for CTFs
- Use when pivoting!
Think of it as nmap's baby sibling, one you can read and fully understand over a single cup of β
π Features
-
β Multi-threaded scanning
Scan ports in parallel. Default thread count is 2. -
β Single-port targeting
Test port 1337, 22, or any you want specifically. -
β Full sweep from 1β8024
By default or with--all
, it scans a wide range in seconds. -
β Sane defaults
No args? It runs:
./chikirustyscan
Defaults to:
threads = 2
address = 127.0.0.1
mode = all ports
π§ͺ Use Cases
- π Quick port checks during CTFs
- π Lab validation during exploit dev
- π‘ Teaching threading + sockets in Rust
π» Get It
Project source hosted on SourceHut:
π ChikiRustyScan Git Repository
Clone and build it:
git clone https://git.sr.ht/~rek2/ChikiRustyScan
cd ChikiRustyScan
cargo build --release
π§ Final Thoughts
This is just the beginning.
ChikiRustyScan can be forked, mutated, and extended β add banner grabbing, service detection, or async networking.
Rust is a powerful weapon in the hacker's arsenal.
This is one of the first blades I forged with it.
Stay tuned for more tools, tactics, and source-level adventures.
-- ReK2