GitHub killertools.net

KillerScan

~/killerscan
$ killerscan --scan 192.168.1.0/24

found 47 hosts in 3.2s
probed 12 open ports across 6 services
identified 38 vendors via MAC OUI
classified printers, switches, APs, endpoints

No installer. No agent. No account. No telemetry.
Free. Open. GPLv3. Built by a field tech, for field techs.

$
Download for Windows (.zip)
Windows 10/11 x64 · ~865 KB · No runtime required · source (zip)
$ KillerScan v1.2.0
Now open source under GPLv3. View on GitHub →

What it does

ARP + Ping Discovery

Dual-method host detection catches devices that don't respond to ICMP, including IoT devices and firewalled endpoints.

Port Probing

Parallel scan of common service ports (SSH, RDP, SMB, HTTP, printing, hypervisor, NAS) with 200ms timeout per port.

Vendor Identification

MAC OUI lookup against the IEEE database identifies device manufacturers -- printers, switches, APs, IoT, and more.

Device Classification

Automatic typing via hostname keywords, OUI vendor, and port fingerprinting. Right-click to manually override any device type.

Export

Export scan results as CSV or HTML report. Right-click any device to copy IP, MAC, hostname, or launch RDP/SSH/browser.

Single File, No Install

Fully self-contained EXE. No installer, no runtime install, no admin rights needed, no dependencies. Drop it on a USB and go.

Requirements

OS: Windows 10 or 11 (x64)

Runtime: None. Everything needed is inside the EXE.

Network: Run as admin for best ARP results on some networks