- Author: Junaid Loonat
- Cost: Free
- Source Code: GitHub
- Version : 1.1
- Requirements: PHP (with the cURL extension)
- License : GPL
- Release Date : 2010-04-13
- Recent Changes : None (Initial Release)
By default the Glype proxy script has few restrictions on what hosts/ports can be accessed through it. In addition, the proxy script normally displays all cURL-related error messages. Using these apparent weaknesses, GlypeAhead is able to perform port scans of targets with reasonable accuracy. Furthermore, the true location of the user is never revealed to the target since all scanning is performed by the remote Glype proxy script.
Please refer to the blog post regarding the tool's release.
quick comparison with Nmap
Nmap scan of a Target (ports 22, 25 and 80)
GlypeAhead scan of a Target (ports 22, 25 and 80)