Fast โข Lightweight โข Practical Recon Tool for Security Engineers
FoxScan is a modern reconnaissance tool built for the initial phase of penetration testing and asset discovery.
It automates:
- ๐ Port scanning using Nmap
- ๐ Service & version detection
- ๐ก HTTP header analysis
โ ๏ธ Security misconfiguration detection
Designed with a performance-first mindset, FoxScan provides meaningful insights without unnecessary complexity.
- Powered by Nmap
- Custom port ranges supported
- Service & version detection (
-sV) - Filters only active/open ports
- Extracts HTTP response headers
- Identifies backend technologies
- Detects exposed server details
Detects:
- Missing
X-Frame-Options - Missing
X-Content-Type-Options - Missing
Strict-Transport-Security - Server version disclosure
- Export scan results
- Machine-readable format
- Ideal for automation pipelines
- Multi-threaded header scanning
- Faster execution with minimal overhead
python foxscan.py example.com -p 1-1000 -o report.jsonsudo apt install nmapsudo dnf install nmapDownload from: https://nmap.org
git clone https://github.com/foxhackerzdevs/FoxScan.git
cd FoxScanpip install -r requirements.txtpython foxscan.py example.compython foxscan.py example.com -p 1-65535python foxscan.py example.com --no-headerspython foxscan.py example.com -o report.json[+] Starting Port Scan on: example.com
example.com:80 -> open (Apache httpd)
[*] Checking Headers: http://example.com
Server: Apache/2.4.49
Content-Type: text/html
[!] Potential Issues:
- Server disclosed: Apache/2.4.49
- Missing X-Frame-Options (Clickjacking risk)
{
"target": "example.com",
"version": "2.1",
"port_scan": {
"example.com": {
"state": "up",
"protocols": {
"tcp": {
"80": {
"state": "open",
"name": "http",
"product": "Apache",
"version": "2.4.49"
}
}
}
}
}
}FoxScan follows real-world reconnaissance workflows:
-
Port Scanning
- Identifies exposed services quickly
- Uses efficient scanning strategies
-
Service Fingerprinting
- Detects technologies & versions
- Assists vulnerability assessment
-
Header Analysis
- Highlights insecure configurations
- Reveals potential attack vectors
FoxScan/
โโโ LICENSE
โโโ README.md
โโโ foxscan.py
โโโ requirements.txt
โโโ assets/
โโโ demo.gif
- ๐ CVE lookup (NVD API integration)
- ๐ Subdomain enumeration
- ๐ท Web crawling engine
- ๐ก OS detection
- ๐ Web dashboard (UI)
- โก Async scanning engine (high-performance mode)
Contributions are welcome!
- Fork the repository
- Create a feature branch
- Commit your changes
- Open a Pull Request
This tool is intended strictly for:
โ Educational purposes โ Ethical hacking โ Authorized penetration testing
โ Unauthorized use is illegal.
The authors are not responsible for misuse.
MIT License ยฉ 2026 Fox Hackerz
We build tools focused on:
- Cybersecurity
- Automation
- Developer systems
๐ GitHub: https://github.com/foxhackerzdevs
๐ฆ Join the pack. Build. Break. Secure.
