Fast โข Minimal โข Practical Recon for Real-World Workflows
FoxScan is a lightweight reconnaissance tool built for the initial phase of penetration testing and asset discovery.
It focuses on clarity over noise, providing structured and meaningful output instead of raw scan dumps.
- Port scanning via Nmap
- Optional service/version detection (
--service) - Smart HTTP/HTTPS detection
- HTTP header analysis
- Basic misconfiguration detection
- JSON reporting for automation pipelines
- Powered by Nmap
- Custom port ranges supported
- Filters only open ports
- Clean, readable output
- Automatically detects HTTP vs HTTPS
- Uses port-based logic (80 โ HTTP, 443 โ HTTPS)
- Avoids unnecessary or failed header scans
- Extracts HTTP response headers
- Identifies backend/server exposure
- Highlights missing security headers
Highlights common misconfigurations:
- Missing
X-Frame-Options - Missing
X-Content-Type-Options - Missing
Strict-Transport-Security - Missing
Content-Security-Policy - Server version disclosure
โ ๏ธ Note: These are observations, not confirmed vulnerabilities.
- Machine-readable structured output
- Ideal for CI/CD pipelines
- Clean automation integration
FoxScan includes a minimal JSON-based interface for automation and tool integration.
Start MCP mode:
python foxscan.py --mcpExample request:
{"id": 1, "action": "scan", "target": "example.com"}Example response:
{"id": 1, "result": {...}}- Multi-threaded header scanning
- Faster recon with minimal overhead
python foxscan.py example.com -p 1-1000 -o report.jsonDebian / Ubuntu
sudo apt install nmapFedora
sudo dnf install nmapWindows Download from: https://nmap.org/download.html
git clone https://github.com/foxhackerzdevs/FoxScan.git
cd FoxScanpip install -r requirements.txtpython foxscan.py example.compython foxscan.py example.com -p 1-65535python foxscan.py example.com --servicepython foxscan.py example.com --no-headerspython foxscan.py example.com --jsonpython foxscan.py example.com -o report.json[+] Starting Port Scan on: example.com
[+] Host: example.com (up)
โโ TCP 80: Apache httpd 2.4.49
[~] HTTP Recon: http://example.com
[+] Headers:
Server: Apache/2.4.49
Content-Type: text/html
[!] Security Observations:
- Server disclosed: Apache/2.4.49
- Missing X-Frame-Options
- Missing X-Content-Type-Options
FoxScan/
โโโ foxscan.py
โโโ requirements.txt
โโโ README.md
โโโ LICENSE
โโโ assets/
โโโ demo.gif
FoxScan follows a practical recon workflow:
- Discovery โ Identify open ports
- Enumeration โ Detect services (optional)
- Analysis โ Extract HTTP headers
- Insight โ Highlight misconfigurations
- CVE lookup (NVD integration)
- Subdomain enumeration
- Web crawling module
- OS detection (Nmap integration)
- Async high-speed scanning engine
- Plugin system
- Web dashboard UI
This tool is intended strictly for:
โ Educational purposes โ Ethical hacking โ Authorized penetration testing
โ Unauthorized use is illegal
The authors are not responsible for misuse.
MIT License ยฉ 2026 Fox Hackerz
Fox Hackerz builds tools focused on:
- Cybersecurity
- Automation
- Developer systems
๐ https://github.com/foxhackerzdevs
๐ฆ Build. Break. Secure.
