All Projects → FireFart → massnmap

FireFart / massnmap

Licence: MIT license
Scans an internal network using massscan and nmap

Programming Languages

python
139335 projects - #7 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to massnmap

nmap-formatter
A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot). Simply put it's nmap converter.
Stars: ✭ 129 (+616.67%)
Mutual labels:  scan, nmap
Awesome Nmap Grep
Awesome Nmap Grep
Stars: ✭ 203 (+1027.78%)
Mutual labels:  scan, nmap
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+688.89%)
Mutual labels:  scan
kubexray
JFrog KubeXray scanner on Kubernetes
Stars: ✭ 22 (+22.22%)
Mutual labels:  scan
kube-beacon
Open Source runtime scanner for k8s cluster and perform security audit checks based on CIS Kubernetes Benchmark specification
Stars: ✭ 60 (+233.33%)
Mutual labels:  scan
Mis-Comandos-Linux
📋 Lista descrita de mis 💯 comandos favoritos ⭐ en GNU/Linux 💻
Stars: ✭ 28 (+55.56%)
Mutual labels:  nmap
sgCheckup
sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.
Stars: ✭ 77 (+327.78%)
Mutual labels:  nmap
default-http-login-hunter
Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.
Stars: ✭ 285 (+1483.33%)
Mutual labels:  nmap
active-scanning-techniques
A compilation of network scanning strategies to find vulnerable devices
Stars: ✭ 61 (+238.89%)
Mutual labels:  nmap
paperbase
Open source document organizer with automatic OCR and full text search
Stars: ✭ 21 (+16.67%)
Mutual labels:  scan
porteye
Detect alive host and open port .
Stars: ✭ 17 (-5.56%)
Mutual labels:  nmap
WPWatcher
Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by email and/or syslog. Schedule scans and get notified when vulnerabilities, outdated plugins and other risks are found.
Stars: ✭ 34 (+88.89%)
Mutual labels:  scan
sharingan
Offensive Security recon tool
Stars: ✭ 88 (+388.89%)
Mutual labels:  nmap
trivy-vulnerability-explorer
Web application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive data table.
Stars: ✭ 63 (+250%)
Mutual labels:  scan
SaltwaterTaffy
An nmap wrapper library for .NET
Stars: ✭ 44 (+144.44%)
Mutual labels:  nmap
DNTScanner.Core
DNTScanner.Core is a .NET 4x and .NET Core 2x+ wrapper for the Windows Image Acquisition library.
Stars: ✭ 54 (+200%)
Mutual labels:  scan
N-WEB
WEB PENETRATION TESTING TOOL 💥
Stars: ✭ 56 (+211.11%)
Mutual labels:  nmap
rest-api
REST API backend for Reconmap
Stars: ✭ 48 (+166.67%)
Mutual labels:  nmap
MassVulScan
Bash script which quickly identifies open network ports and any associated vulnerabilities / Script Bash qui permet d'identifier rapidement les ports réseaux ouverts et les éventuelles vulnérabilités associées.
Stars: ✭ 56 (+211.11%)
Mutual labels:  nmap
ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+14966.67%)
Mutual labels:  nmap

MASSNMAP

This little script gets all DNS A records for a given zone via zone transfer (your machine must be allowed for it), gathers open ports via massscan and then fires up single nmap scans for version detection and scripts of the single hosts. The ports to scan are determined via the nmap-services file. The output is saved in various files and all NMAP xml outputs are stored in the results folder for further processing.

To configure the scan modify the provided scan.cfg.example and pass it via the -c parameter

Requirements

  • Python3
  • massscan
  • nmap

Sample

./run.py -c scan.cfg

Running as a service

sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which nmap)
sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which masscan)
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].