< back to all projects
$ ./lanscope --scan 192.168.0.0/24

LANScope

Network mapper//Self-hosted//Shareable reports

A Shodan-style scanner for the network you actually own. Maps every device on the LAN, finds open ports, default creds, and known CVEs, then ships you a clean PDF you can hand to a client or pin to a fridge.

[STATUS · WIP] > github · soon > download · soon
01

/overview

// what · why

LANScope is the tool I'd hand to a small business that just got a new router and has no idea what's actually on their network. One click, a complete inventory, and a list of things to fix — in plain language.

Behind the GUI it's Nmap doing the heavy lifting, with a Node backend that correlates results against a CVE feed and a small database of known default credentials. The Electron front-end visualizes the network as a live graph: hosts, services, severity-ranked findings, and exportable reports.

It's deliberately scoped to the LAN. No cloud uploads, no telemetry, no scary dashboard. Plug it in on a laptop, run a scan, get a PDF. The only thing leaving your network is the report you choose to send.

02

/planned features

// roadmap
  • Auto-detect local subnet + interface
  • Host discovery + MAC vendor lookup
  • Full TCP / common UDP port sweeps
  • Service + version fingerprinting (Nmap NSE)
  • Default credential dictionary check
  • Local CVE matcher (offline NVD mirror)
  • Network graph with severity heatmap
  • Per-host detail drawer
  • PDF + HTML report export
  • Saved scan history with diff view
  • One-click "rescan" for changed hosts
  • No telemetry, no cloud, ever
03

/stack

// planned
Electron Node.js Nmap SQLite D3.js Puppeteer (PDF) NVD feed
04

/preview

// planned cli
bash · planned
# gui mode (default)
$ npm install
$ npm start

# headless mode for ci or cron
$ lanscope scan --range 192.168.0.0/24 --report pdf
$ lanscope diff  --against last --threshold high

// Architecture is in flux. CLI shape may shift before public release.