Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Masscan | 21,110 | 3 days ago | 1 | February 27, 2018 | 386 | other | C | |||
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. | ||||||||||
Rustscan | 10,022 | 12 days ago | 17 | April 27, 2022 | 127 | gpl-3.0 | Rust | |||
🤖 The Modern Port Scanner 🤖 | ||||||||||
Sn1per | 6,492 | 4 days ago | 6 | other | Shell | |||||
Attack Surface Management Platform | Sn1perSecurity LLC | ||||||||||
Naabu | 3,378 | 1 | 5 days ago | 30 | July 31, 2022 | 31 | mit | Go | ||
A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests | ||||||||||
Cameradar | 3,047 | 8 months ago | 7 | November 08, 2021 | 22 | mit | Go | |||
Cameradar hacks its way into RTSP videosurveillance cameras | ||||||||||
Nmapautomator | 1,312 | 2 years ago | 4 | mit | Shell | |||||
A script that you can run in the background! | ||||||||||
Androidnetworktools | 1,247 | 2 months ago | 29 | apache-2.0 | Java | |||||
Set of useful android network tools | ||||||||||
Atscan | 1,178 | 2 years ago | mit | Perl | ||||||
Advanced dork Search & Mass Exploit Scanner | ||||||||||
Ladongo | 1,177 | 2 months ago | 2 | mit | Go | |||||
LadonGO 4.2 Pentest Scanner framework 全平台Go开源内网渗透扫描器框架,Windows/Linux/Mac内网渗透,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBanner/HttpTitle/TcpBanner/Weblogic/Oxid多网卡主机,端口扫描服务识别PortScan。 | ||||||||||
Static Code Scan | 1,070 | 6 years ago | other | JavaScript | ||||||
Run this quick static code scan on any URL to check for out-of-date libraries, layout issues and accessibility. |
A script you can run in the background!
The main goal for this script is to automate the process of enumeration & recon that is run every time, and instead focus our attention on real pentesting.
This will ensure two things:
Once initial ports are found 'in 5-10 seconds', we can start manually looking into those ports, and let the rest run in the background with no interaction from our side whatsoever.
Note: This is a reconnaissance tool, and it does not perform any exploitation.
With the recon
option, nmapAutomator will automatically recommend and run the best recon tools for each found port.
If a recommended tool is missing from your machine, nmapAutomator will suggest how to install it.
nmapAutomator is 100% POSIX compatible, so it can run on any sh
shell, and on any unix-based machine (even a 10 YO router!), which makes nmapAutomator ideal for lateral movement recon.
If you want to run nmapAutomator on a remote machine, simply download a static nmap binary from this link, or with static-get, and transfer it to the remote machine. You can then use -s/--static-nmap
to specify the path to the static nmap binary.
With the -r/--remote
flag nmapAutomator will run in Remote Mode, which is designed to run using POSIX shell commands only, without relying on any external tools.
Remote Mode is still under development. Only following scans currently work with -r
:
nmapAutomator saves the output of each type of scan is saved into a separate file, under the output directory.
The entire script output is also saved, which you can view with less -r outputDir/nmapAutomator_host_type.txt
, or you can simply cat
it.
ffuf, which we can install with:
sudo apt update
sudo apt install ffuf -y
Or Gobuster 'v3.0 or higher', which we can install with:
sudo apt update
sudo apt install gobuster -y
Other recon tools used within the script include: |nmap Vulners|sslscan|nikto|joomscan|wpscan| |:-:|:-:|:-:|:-:|:-:| |droopescan|smbmap|enum4linux|dnsrecon|odat| |smtp-user-enum|snmp-check|snmpwalk|ldapsearch||
Most of these should be installed by default in Parrot OS and Kali Linux.
If any recon recommended tools are found to be missing, they will be automatically omitted, and the user will be notified.
git clone https://github.com/21y4d/nmapAutomator.git
sudo ln -s $(pwd)/nmapAutomator/nmapAutomator.sh /usr/local/bin/
./nmapAutomator.sh -h
Usage: nmapAutomator.sh -H/--host <TARGET-IP> -t/--type <TYPE>
Optional: [-r/--remote <REMOTE MODE>] [-d/--dns <DNS SERVER>] [-o/--output <OUTPUT DIRECTORY>] [-s/--static-nmap <STATIC NMAP PATH>]
Scan Types:
Network : Shows all live hosts in the host's network (~15 seconds)
Port : Shows all open ports (~15 seconds)
Script : Runs a script scan on found ports (~5 minutes)
Full : Runs a full range port scan, then runs a thorough scan on new ports (~5-10 minutes)
UDP : Runs a UDP scan "requires sudo" (~5 minutes)
Vulns : Runs CVE scan and nmap Vulns scan on all found ports (~5-15 minutes)
Recon : Suggests recon commands, then prompts to automatically run them
All : Runs all the scans (~20-30 minutes)
Example scans:
./nmapAutomator.sh --host 10.1.1.1 --type All
./nmapAutomator.sh -H 10.1.1.1 -t Basic
./nmapAutomator.sh -H academy.htb -t Recon -d 1.1.1.1
./nmapAutomator.sh -H 10.10.10.10 -t network -s ./nmap
Feel free to send your pull requests :)
For any pull requests, please try to follow these Contributing Guidelines.