Sherlock Forensics Port Scanner performs TCP connect scans against target hosts to identify open ports and running services. It operates without WinPcap or Npcap dependencies and requires no elevated privileges. The tool scans individual hosts or CIDR ranges and exports results to CSV for integration with vulnerability management workflows.
Every scan produces a timestamped record of open ports with service identification derived from banner grabbing. This data feeds directly into penetration test documentation, compliance audit reports and network inventory assessments.
Core Features
- TCP Connect Scanning
- Full TCP handshake scanning on any port range from 1 to 65535. No raw socket requirements. Works without admin privileges on standard Windows installations.
- Service Banner Grabbing
- Identifies software and version strings on open ports. Detects web servers, SSH daemons, FTP services, database listeners and other common network services.
- Custom Port Ranges
- Scan the top 1000 ports by default or specify custom ranges. Target individual ports, comma-separated lists or continuous ranges for focused assessments.
- CIDR Range Support
- Scan entire subnets using CIDR notation. Useful for network inventory and identifying unauthorized services across a network segment.
- CSV Export
- Export scan results with timestamp, target host, port number, protocol, state and service identification. Import directly into spreadsheets or reporting tools.
- SHA256 Verification
- Published SHA256 hash for download integrity verification. Confirm the installer has not been tampered with before execution.