Skip to content

Valkan is a real tool, developed for legitimate network scanning and vulnerability exploitation activities in controlled and authorized environments.

License

Notifications You must be signed in to change notification settings

fatosmisticos77/Valkan

Β 
Β 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

37 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ•΅οΈβ€β™‚οΈ Valkan - Network Scanner & Exploration Vulnerability

Go Cybersecurity Open Source License: AGPL v3

⚠️ Disclaimer
Valkan is a real and powerful tool, designed specifically for legitimate network scanning and vulnerability exploitation in controlled and authorized environments.
Its usage is strictly limited to offensive security testing, ethical hacking, and auditing with explicit permission from system owners.
Any unauthorized or illegal use is strictly prohibited and may violate applicable laws, including the Marco Civil da Internet (Law No. 12,965/2014).
The author bears no responsibility for misuse, damages, or illegal activities resulting from this tool.


image

πŸ“Œ Table of Contents


🎯 Objective

This project provides a functional tool for:

  • Network scanning on ports 1–1024 or full range, detecting open services and potential vulnerabilities.
  • Modular engine with components such as Reporter, Detector, HTTP module, and CLI-based terminal interface.
  • Built in Go (Golang) for high performance, concurrent scanning, and low memory usage.
  • Designed for real-world offensive security assessments in authorized and controlled environments.

🌐 Website

https://valkan.vercel.app/

The website was designed with ease, focused on helping the community download and install Valkan easily. Just click Download and Valkan will be ready to go. We'll be creating full documentation in the future...

☁️ Features

  • Concurrent port scanning (TCP/UDP)
  • Banner grabbing
  • Firewall detection (silent)
  • JSON and terminal reporting
  • CLI interface with Cobra
  • Web UI
  • OS fingerprinting (coming soon)
  • CVE matching (in development)
  • Web technology detection
  • Directory fuzzing
  • Scriptable engine (Go or Lua-based)
  • HTML and CSV export
  • Host discovery (ICMP, ARP, TCP ping)
  • Terminal UI (TUI)
  • Vulnerable configuration detection (e.g. anonymous FTP)

🧰 Technologies WebSite

The website is simple and purposefully designed as a tool, not a product meant to be displayed on display. If you'd like to contribute to the creation and updating of the website, send a message to Vyzer9. The website was made with the languages:

My Skills

🧰 Technologies Tool

  • Language: Go (Golang) and others

  • Core Libraries & Modules:

    • cobra – CLI framework for structured command-line interfaces
    • net – Network operations (TCP/UDP scanning, IP resolution)
    • http – HTTP requests and header/banner grabbing
    • os – OS-level access for system interaction and info gathering
    • os/exec – Execution of system commands when necessary
    • fmt – Terminal output formatting
    • encoding/json – JSON output for structured reporting
    • runtime – System architecture and OS detection
    • time – Timeout handling, scan delays, and timestamping

    My Skills


πŸ—οΈ Architecture

The architecture is modular, concurrent, and extensible, designed for flexibility and performance in real-world security assessments:

  • πŸ”Ž Scanner Module
    Performs port scanning (range: 1–1024 or 1–65535) using concurrent routines for fast network enumeration.

  • 🧠 Detector Module
    Analyzes open ports and services, performs banner grabbing, and identifies potential vulnerabilities or weak configurations.

  • πŸ“ Reporter Module
    Outputs results in structured formats (e.g., console, JSON), enabling easy parsing and documentation of scan results.

  • 🌐 HTTP Module
    Sends requests to web services to extract HTTP headers, status codes, server info, and other metadata.

  • πŸ’» CLI Interface
    Built with cobra to provide a clean and interactive command-line experience.

  • βš™οΈ System Info Layer
    Detects system architecture, OS type, kernel version, and other relevant environment data.

  • πŸ“¦ Future Web UI (In Development)
    A user-friendly web dashboard is under development (started on 2025-09-06) for managing scans and visualizing results.

βš™οΈ Download

1. Download in WebSIte

image

πŸ₯· Run Valkan

1. List Itens

When you arrive at the terminal, you will direct the terminal to where the Valkan file is and use the command:

ls
chmod +x ./Valkan

This command is used to list items.

image

2. Command

You will enter the command:

./valkan

and finish, congratulations

image

🀝 Contribution Guidelines

Contributions are welcome, provided they align with the educational goals of the project.
If you find bugs, have ideas for improvements, or want to add features, feel free to contribute via pull requests.

To contribute:

  1. Fork the repository.
  2. Create a branch with your changes.
  3. Submit a pull request with a detailed description of your changes.

πŸ“„ License

This project is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0).
See the LICENSE file for details.

πŸ“¬ Contact

  • Contact the author via GitHub
image

About

Valkan is a real tool, developed for legitimate network scanning and vulnerability exploitation activities in controlled and authorized environments.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Go 100.0%