Inspiration
Modern port scanners are either too slow, too limited, or too complex for beginners. I wanted a tool that was fast, simple to use, visually engaging, and still accurate enough for real security analysis. OPEN-PORT REAPER was born from the idea of combining a hacker-style interface with practical defensive value. Something educational, but also powerful enough for real network checks.
What it does
OPEN-PORT REAPER performs a full asynchronous scan of all 65,535 ports, detects open services, captures banners, analyzes risks, and recommends security fixes. It also generates a clean PDF report that includes service details, attack possibilities, severity ratings, and remediation steps. The UI provides a live matrix-style display and a simple workflow for scanning any host.
How I built it
The backend is built with Python, asyncio, and Flask. Async socket connections allow the scanner to check thousands of ports at once. Banner grabbing, service detection, severity scoring, and recommendations are all handled through custom logic and reference databases. The frontend uses HTML, CSS, and a bit of JavaScript to create the cyber-themed interface. ReportLab is used to generate the structured PDF output.
Challenges we ran into
The biggest challenge was balancing speed with accuracy. Handling thousands of asynchronous connections without hitting system limits took careful tuning. PDF formatting was also tricky because the report needed to stay clean and readable while handling different data for each port. Making sure banner data passed correctly from the UI to the report generator required multiple fixes.
Accomplishments that we're proud of
The scanner is fully asynchronous, visually polished, and genuinely useful for real security testing. It identifies services, captures banners, evaluates attack surfaces, and produces a professional-quality PDF report. Building a tool that is both beginner-friendly and technically solid is something I’m very proud of.
What we learned
I learned a lot about asynchronous network operations, service fingerprinting, PDF generation, and designing a user interface that feels satisfying to use. I also gained experience in debugging race conditions, managing large data structures, and integrating frontend and backend workflows smoothly.
What's next for OPEN-PORT REAPER
I plan to add OS fingerprinting, service version detection, better visualization of risk levels, and a proper CLI mode. Another goal is to include a lightweight knowledge base that explains each vulnerability in depth. Eventually, I want this to become a full reconnaissance toolkit with more modules and smarter analysis.
Built With
- async
- css3
- flask
- html5
- iana
- javascript
- python
Log in or sign up for Devpost to join the conversation.