LinuxCommandLibrary

unicornscan

TLDR

Basic TCP SYN scan

$ unicornscan [192.168.1.1]
copy
Scan specific ports
$ unicornscan [192.168.1.1]:[22,80,443]
copy
Scan port range
$ unicornscan [192.168.1.1]:[1-1000]
copy
UDP scan
$ unicornscan -mU [192.168.1.1]
copy
Scan at specific rate
$ unicornscan -r [1000] [192.168.1.1]
copy
Immediate verbose output
$ unicornscan -Iv [192.168.1.1]
copy
Scan network range
$ unicornscan [192.168.1.0/24]:[80,443]
copy
Save results to pcap
$ unicornscan -w [scan.pcap] [192.168.1.1]
copy

SYNOPSIS

unicornscan [options] target[:ports]

DESCRIPTION

unicornscan is an asynchronous network scanner designed for high-speed reconnaissance. It uses a custom TCP/IP stack that separates packet sending and receiving into different threads, enabling much faster scanning than traditional scanners.
The scanner supports various TCP flag combinations, UDP scanning, and OS/service fingerprinting through loadable modules. Its asynchronous design makes it particularly effective for scanning large networks.
Output can be customized and saved to pcap files for later analysis. The tool integrates with databases for storing scan results.

PARAMETERS

-m mode

Scan mode: T (TCP SYN), U (UDP), sf (connect), A (ARP).
-r pps
Packets per second rate.
-i interface
Network interface to use.
-I
Immediate mode: display results as found.
-v
Verbose output.
-H
Resolve hostnames in output.
-l file
Log output to file.
-w file
Write packets to pcap file.
-L seconds
Packet timeout (default: 7).
-p ports
Global ports to scan.
-B port
Source port for scanning.
-b layer
Send broken CRC: T (transport), N (network), TN (both).
-e module
Enable module (e.g., osdetect).
-E
Process error responses (ICMP, RST).
-Q
Quiet mode.
-h
Display help.

SCAN MODES

-mT: TCP SYN scan (default)
-mTsA: TCP ACK scan
-mTsF: TCP FIN scan
-mTs: TCP NULL scan
-mTsFPU: TCP Xmas scan
-msf: TCP connect scan
-mU: UDP scan

CAVEATS

Requires root privileges for raw socket access. High scan rates may trigger IDS/IPS. Custom TCP stack may behave differently than system stack. Use only with authorization on target networks.

HISTORY

unicornscan was developed by Jack Louis and Robert E. Lee. It was designed for scalability and speed, addressing limitations of synchronous scanners. The tool became popular for penetration testing and is included in Kali Linux.

SEE ALSO

nmap(1), masscan(1), zmap(1), hping3(1)

Copied to clipboard