β οΈ Disclaimer
Valkan is a real and powerful tool, designed specifically for legitimate network scanning and vulnerability exploitation in controlled and authorized environments.
Its usage is strictly limited to offensive security testing, ethical hacking, and auditing with explicit permission from system owners.
Any unauthorized or illegal use is strictly prohibited and may violate applicable laws, including the Marco Civil da Internet (Law No. 12,965/2014).
The author bears no responsibility for misuse, damages, or illegal activities resulting from this tool.
- π― Objective
- π Website
- βοΈ Features
- π§° Technologies WebSite
- π§° Technologies Tool
- ποΈ Architecture
- βοΈ Download
- π₯· Run Valkan
- π€ Contribution Guidelines
- π License
- π¬ Contact
This project provides a functional tool for:
- Network scanning on ports 1β1024 or full range, detecting open services and potential vulnerabilities.
- Modular engine with components such as Reporter, Detector, HTTP module, and CLI-based terminal interface.
- Built in Go (Golang) for high performance, concurrent scanning, and low memory usage.
- Designed for real-world offensive security assessments in authorized and controlled environments.
The website was designed with ease, focused on helping the community download and install Valkan easily. Just click Download and Valkan will be ready to go. We'll be creating full documentation in the future...
- Concurrent port scanning (TCP/UDP)
- Banner grabbing
- Firewall detection (silent)
- JSON and terminal reporting
- CLI interface with Cobra
- Web UI
- OS fingerprinting (coming soon)
- CVE matching (in development)
- Web technology detection
- Directory fuzzing
- Scriptable engine (Go or Lua-based)
- HTML and CSV export
- Host discovery (ICMP, ARP, TCP ping)
- Terminal UI (TUI)
- Vulnerable configuration detection (e.g. anonymous FTP)
The website is simple and purposefully designed as a tool, not a product meant to be displayed on display. If you'd like to contribute to the creation and updating of the website, send a message to Vyzer9. The website was made with the languages:
-
Language: Go (Golang) and others
-
Core Libraries & Modules:
cobra
β CLI framework for structured command-line interfacesnet
β Network operations (TCP/UDP scanning, IP resolution)http
β HTTP requests and header/banner grabbingos
β OS-level access for system interaction and info gatheringos/exec
β Execution of system commands when necessaryfmt
β Terminal output formattingencoding/json
β JSON output for structured reportingruntime
β System architecture and OS detectiontime
β Timeout handling, scan delays, and timestamping
The architecture is modular, concurrent, and extensible, designed for flexibility and performance in real-world security assessments:
-
π Scanner Module
Performs port scanning (range:1β1024
or1β65535
) using concurrent routines for fast network enumeration. -
π§ Detector Module
Analyzes open ports and services, performs banner grabbing, and identifies potential vulnerabilities or weak configurations. -
π Reporter Module
Outputs results in structured formats (e.g., console, JSON), enabling easy parsing and documentation of scan results. -
π HTTP Module
Sends requests to web services to extract HTTP headers, status codes, server info, and other metadata. -
π» CLI Interface
Built withcobra
to provide a clean and interactive command-line experience. -
βοΈ System Info Layer
Detects system architecture, OS type, kernel version, and other relevant environment data. -
π¦ Future Web UI (In Development)
A user-friendly web dashboard is under development (started on2025-09-06
) for managing scans and visualizing results.
When you arrive at the terminal, you will direct the terminal to where the Valkan file is and use the command:
ls
chmod +x ./Valkan
This command is used to list items.
You will enter the command:
./valkan
and finish, congratulations
Contributions are welcome, provided they align with the educational goals of the project.
If you find bugs, have ideas for improvements, or want to add features, feel free to contribute via pull requests.
To contribute:
- Fork the repository.
- Create a branch with your changes.
- Submit a pull request with a detailed description of your changes.
This project is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0).
See the LICENSE file for details.
- Contact the author via GitHub