This tool is intended for use by authorized security testers only. Unauthorized testing is prohibited and will be at your own risk.
Milkyway is an all-in-one scanning tool with efficient features for host discovery, port scanning, protocol identification, fingerprinting, vulnerability scanning, and more.
- Protocol recognition implemented in pure Go
- Rich scanning modes
- Support for randomized port scanning (the larger the target, the faster and more accurate the scan)
If you like this tool, please star it~
- Information Gathering
- IP & Port live detection
- Web probing
- Protocol identification (
mysql
,redis
,smb
,ldap
,ssh
,vnc
,ftp
,smtp
,rdp
)
- Brute Force
ssh
,mysql
,redis
,vnc
- to be continued
- Vulnerability Detection
- redis unauthorized access
- EternalBlue / EternalBlack
- nuclei vulnerability engine
- Select POC by
tags
orid
- Additional Features
- Real-time log printing
- Custom fingerprint file loading
- Custom POC preload directories or files
http
/socks5
proxy support- Support
fofa
query, pull targets fromfofa
- Supports
url
input - Supports extracting targets from files
--finger-file
Custom web fingerprint file loading--scan-random
Whether to randomize port scanning--full-scan
Perform full protocol identification on open ports (default only specific ports are identified)--verbose
Print detailed protocol information--no-match
Skip fingerprint rule matching before vulnerability scanning--poc-file
Custom nuclei poc file/directory--fofa-query
Use fofa query to extract targets (When using fofa query to import targets, system environment variable FOFA_KEY must be set to your fofa-key)
milkyway.exe -t 192.168.1.1/24
(Ports default to the "default" list, scanning the top 809 ports)
milkyway.exe --fofa-query 'domain=baidu.com'
(Extract targets using fofa query)
milkyway.exe -t 192.168.1.1/24 -s socks5://127.0.0.1:1080
(Use socks5 proxy)
milkyway.exe -t 192.168.1.1/24 -c 500
(Set the number of workers in the thread pool)
-
Using fofa for external network probing, and using unordered scan:
milkyway.exe --fofa-query 'domain=vulfocus.cn||host=vulfocus.cn' -p all --no-ping --scan-random
-
Setting concurrency to 1000 and using unordered scan for all internal ports:
milkyway.exe -t 192.168.1.0/24 -p all --scan-random -c 1000 --no-ping
milkyway.exe -t 192.168.1.1/24 -p company
(Scan the 87 most commonly used ports for companies)
milkyway.exe -t 192.168.1.1/24 -p small --full-scan
(Full protocol scan on the first 12 ports)
milkyway.exe -t 192.168.1.1/24 --no-ping
(Skip ICMP scan)
milkyway.exe -t 192.168.1.1/24 --finger-file ./your_file
(Use custom fingerprint file)
milkyway.exe -t 192.168.1.1/24 --verbose
(Print detailed protocol information)
milkyway.exe -t 192.168.1.1/24 --no-match
(Do not match fingerprints before vulnerability scanning)
milkyway.exe -t 192.168.1.1/24 --poc-file ./your_file
(Custom POC directory)
milkyway.exe -t 192.168.1.1/24 --poc-tags cve,cnvd
(Specify multiple POC tags)
sql
: Common database ports,small
: Top 12 common ports,all
: All ports
Special thanks to FOFA official
Milkyway has joined the FOFA Co-creation Plan. Thanks to FOFA for providing account support.
# Reference Projects https://github.com/shadow1ng/fscan