# README
networkscan offers security teams a data-rich network scanning and enumeration techniques to help them gain visibility into all of their cloud and on-premise environments. Designed with data-modeling and data-integration needs in mind, networkscan can be used on its own as an interactive CLI, orchestrated as part of a broader data pipeline, or leveraged from within the Method Platform.
The types of scans that networkscan can conduct are constantly growing. For the most up to date listing, please see the documentation here
To learn more about networkscan, please see the Documentation site for the most detailed information.
Quick Start
Get networkscan
For the full list of available installation options, please see the Installation page. For convenience, here are some of the most commonly used options:
docker run methodsecurity/networkscan
docker run ghcr.io/method-security/networkscan
- Download the latest binary from the Github Releases page
- Installation documentation
General Usage
networkscan portscan <target>
Examples
networkscan portscan --topports 100 scanme.sh
Contributing
Interested in contributing to networkscan? Please see our organization wide Contribution page.
Want More?
If you're looking for an easy way to tie networkscan into your broader cybersecurity workflows, or want to leverage some autonomy to improve your overall security posture, you'll love the broader Method Platform.
For more information, visit us here
Community
networkscan is a Method Security open source project.
Learn more about Method's open source source work by checking out our other projects here or our organization wide documentation here.
Have an idea for a Tool to contribute? Open a Discussion here.