
Product
Introducing Reports: An Extensible Reporting Framework for Socket Data
Explore exportable charts for vulnerabilities, dependencies, and usage with Reports, Socket’s new extensible reporting framework.
hprobe
Advanced tools
A high-performance HTTP probing tool for asset discovery.
hprobe 是一个基于 Rust 实现的 高性能 HTTP 探测引擎,提供直观易用的 Python API。
它支持同步与异步扫描,在大规模目标场景下能够高效完成 HTTP 服务探测、TLS 信息解析以及应用指纹与技术栈识别,适用于资产发现、网络空间测绘与自动化安全评估。
🔗 GitHub: https://github.com/FlyfishSec/hprobe-python
Tokio 异步运行时,极致高并发
纳秒级 ASN 查询
极速 Web 指纹识别
# PyPI 安装(Python >=3.7)
pip install hprobe
import hprobe
# 核心配置
CORE_CONFIG = {
# 目标支持ip/domain/url,示例:192.168.1.1/example.com/192.168.1.1:443/https://example.com
"target": "example.com", # 必选
"ports": [80, 443], # 可选:探测端口,不填则使用自动端口识别
"timeout": 5.0, # 可选:超时配置,默认10s
"threads": 64, # 可选:并发数配置,默认80
"tls_info": True, # 可选:开启TLS证书信息检测
"asn": True, # 可选:开启ASN归属查询
"tech_detect": True, # 可选:开启技术栈识别
"fingerprint": True, # 可选:开启Web指纹识别
"silent": True, # 可选:禁用命令行冗余日志
}
# 一行调用(字典接口,推荐)
result = hprobe.scan_target_with_config(CORE_CONFIG)
# 打印结果(返回字典,含所有探测信息)
print("探测结果:", result)
import asyncio
import hprobe
# 核心配置
CORE_CONFIG = {
# 目标支持ip/domain/cidr/url
# 示例:192.168.1.1、example.com、192.168.1.1:443、192.168.1.1/24、https://example.com
"target": "192.168.1.1/24", # 必选
"ports": [80, 443], # 可选:探测端口,不填则使用自动端口识别
"timeout": 5.0, # 可选:超时配置,默认10s
"threads": 64, # 可选:并发数配置,默认80
"tls_info": True, # 可选:开启TLS证书信息检测
"asn": True, # 可选:开启ASN归属查询
"tech_detect": True, # 可选:开启技术栈识别
"fingerprint": True, # 可选:开启Web指纹识别
"silent": True, # 可选:禁用命令行冗余日志
}
async def async_core_scan():
# 异步字典接口,一行调用
result = await hprobe.scan_target_with_config_async(CORE_CONFIG)
print("探测结果:", result)
# 执行异步函数并打印结果
asyncio.run(async_core_scan())
import hprobe
import asyncio
async def simple_async_scan():
# 直接设置目标,其余用默认配置
result = await hprobe.HprobeScanner().set_target("192.168.1.1/24").set_timeout(1.0).scan_async()
print(f"扫描结果:共探测到{len(result)}个资产")
# 遍历结果取值
for asset in result:
print(f"存活资产:{asset.get('url')},状态码:{asset.get('status_code')}")
# 执行异步函数
asyncio.run(simple_async_scan())
import hprobe
# 同步核心:一行链式调用,直接返回解析后的列表
result = hprobe.HprobeScanner().set_target("httpbin.org").set_tech_detect(True).scan()
# 简单结果展示
if result:
print(f"目标{result[0].get('target')}探测完成,技术栈:{result[0].get('technologies')}")
# ⚠️ 可选:自定义数据目录
# import os
# os.environ["HPROBE_DATA_ROOT"] = r"C:\mydata\"
target
扫描目标,支持 IP 或域名
ports
探测端口列表,例如:[80, 443]
threads
并发线程数,用于控制整体并发规模
timeout
单请求超时时间(单位:秒)
methods
HTTP 请求方法:GET / POST
scheme_policy
协议策略:Auto / HTTP / HTTPS
user_agent
自定义 User-Agent,默认使用内置随机
max_redirects
最大重定向次数,设置为0则禁止重定向
post_data
POST 请求体数据(字符串)
post_file
POST 文件路径(与 post_data 二选一)
content_type
POST 请求 Content-Type
默认值:application/x-www-form-urlencoded
path
请求路径(逗号分割,与 path_file 二选一)
默认值:/
path_file
path文件路径
asn
是否启用 ASN 查询
tech_detect
是否启用技术栈识别
fingerprint
是否启用 Web 指纹识别
common_ports
是否启用常见端口扫描
silent
静默模式,仅输出结果,不打印日志
dns
指定dns: [223.5.5.5,8.8.8.8]
proxy
使用代理(http/https/socks):socks5://127.0.0.1:1080
Copyright (c) 2026 FlyfishSec All rights reserved.
FAQs
High-performance HTTP probing engine written in Rust
We found that hprobe demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Explore exportable charts for vulnerabilities, dependencies, and usage with Reports, Socket’s new extensible reporting framework.

Product
Socket for Jira lets teams turn alerts into Jira tickets with manual creation, automated ticketing rules, and two-way sync.

Company News
Socket won two 2026 Reppy Awards from RepVue, ranking in the top 5% of all sales orgs. AE Alexandra Lister shares what it's like to grow a sales career here.