OmniScan
20KB. Scan your network. Install nothing. Leave no trace. It never existed.
The Problem
Network scanning tools leave traces: installation records in package managers, logs in syslog, temp files, loaded shared libraries. In forensic and pentesting contexts, these traces can compromise the operation. Existing tools also carry dependency chains that represent attack surface.
The Solution
OmniScan is a ~20KB network scanner that discovers hosts, open ports, and services. It runs from any directory, generates no logs (it doesn't use syslog), creates no temp files (it doesn't use libc tmpfile), and leaves no package records. The only trace is shell history — which can be cleared.
Why Bare-Metal Matters
A forensic-clean scanner cannot use libc — libc loads shared libraries, creates temp files, and interacts with system logging. OmniScan uses raw syscalls, which means the kernel is the only layer involved. Combined with OmniBoot, you get zero-trace scanning on zero-trace boot: absolute forensic cleanliness.
Technical Specifications
| Feature | Value |
|---|---|
| Binary Size | ~20KB |
| Capabilities | Host discovery, port scanning, service detection |
| Installation | None — run from any directory |
| Dependencies | None |
| System Trace | Zero (no logs, no temp files, no syslog) |
| Persistence | None — stateless execution |
| Output | Stdout or file (user-controlled) |
Comparison
| OmniScan | nmap | Nessus | |
|---|---|---|---|
| Size | ~20KB | 25MB + deps | 500MB+ |
| Installation | None | Package manager | Installer + license |
| System trace | Zero | Logs, package records | Service, logs, DB |
| Dependencies | None | libc, libpcap, lua | JVM, OpenSSL, ... |
| Cost | $3K one-time | Free (GPLv2) | $5K+/year |
| Forensic-clean | Yes | No | No |
Use Cases
Penetration Testing
Scan target networks without leaving evidence on the scanning machine. No installation to explain. No logs to clean. No dependencies to justify.
Forensic Network Analysis
Map a suspect network from a forensic workstation without contaminating the investigation environment.
Compliance Auditing
Scan for open ports and unauthorized services across your network. Single binary. No installation overhead. Run, report, done.