seramo

A lightweight Bash tool to scan common CDN ports on a list of IPs and domains.

83
4
100% credibility
Found Apr 18, 2026 at 83 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Shell
AI Summary

A simple tool that tests specific common secure ports on a list of IP addresses and domains, showing which are open or closed for quick CDN endpoint identification.

How It Works

1
🔍 Discover the checker

You hear about a simple tool that quickly checks if websites or addresses have common secure connection points open, perfect for spotting CDN setups.

2
📥 Get the tool

Download the lightweight checker file to your computer and make it ready to use.

3
📝 Make your list

Create a plain text list of websites or internet addresses you want to check, one per line.

4
🚀 Start the scan

Run the checker with your list and watch it test each one for open secure spots.

5
📊 See the results

Get a clear report grouping successes with checkmarks, failures with crosses, and any lookup issues.

Know your connections

You now quickly see which sites have active secure ports, helping you understand their setup at a glance.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 83 to 83 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is sni-scanner?

Sni-scanner is a lightweight Bash tool that scans common CDN ports like 443, 2053, and 2087 on a list of IPs or domains from a simple text file. Feed it targets.txt with mixed inputs, and it auto-resolves domains using dig, then probes ports with nc to flag open or closed ones, sorting results into OK (open ports), FAIL (all closed), or RESOLVE FAILED buckets. It's built for quick checks on CDN endpoints from providers like Cloudflare or Fastly, without any heavy dependencies.

Why is it gaining traction?

Its dead-simple setup—no installs beyond bash, nc, and dig—beats bloated alternatives for one-off scans, delivering clean output that highlights reachable hosts fast. Developers grab it as a lightweight SNI scanner on GitHub for probing SNI bug hosts or verifying CDN configs, especially when you need results in seconds without Python charts or complex clients. The predefined port list tailored to real-world CDNs like those behind Skyscanner or Betfair setups is the hook.

Who should use this?

Network engineers auditing CDN exposure on production IPs, security ops teams hunting SNI bugs on host lists, or DevOps folks validating domain resolutions and port openness before deployments. It's perfect for sysadmins scripting quick recon on targets like reality SNI scanner GitHub projects target, without firing up full Nmap suites.

Verdict

With 83 stars and a 1.0% credibility score, it's raw and untested but punches above its weight for lightweight Bash port checks—docs are solid, output is crisp. Use it for ad-hoc CDN probes if you tolerate minimal maturity; otherwise, layer on your own tests.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.