The tool aims at automating the identification of potential services running behind ports identified manually either through manual scan or services running locally.
Features
Alternative for network scanning tools like nmap.
Installation
- git clone https://github.com/TH3xACE/OFFPORT_KILLER.git
- cd OFFPORT_KILLER
- ./OFFPORT_KILLER.sh
Demo

Usage
./OFFPORT_KILLER.sh -i inputfile.txt -r report.txt -e /tmp/
Options
- -i : input file (format IP:PORT)
- -r : report name (save the output)
- -h : help
Steps
Step 1: Perform a manual port scanning (using nc, tcpdump or whatever) or identify services running locally.
Step 2: Create a file with format IP:PORT (where IP is the target IP address and PORT is a port identified).
Step 3: Run the tool with the file created using the argument -i.