Nmap Development mailing list archives

Nmap Fan Edition 'One-Click' CLI Frontend


From: Renzo Donegani <renzo.doneg () gmail com>
Date: Fri, 25 Aug 2023 16:18:38 +0200

Hello, fellow Cyber Security enthusiasts!
I have some exciting news to share with you.

I have created a Zsh script based on Nmap that works as a CLI Frontend.
This Zsh script - named Nmap-FE - has been created to perform a 'Smart
One-Click Scan' of a typical Windows-Linux-MacOS Target in less than 45
Minutes, you just need to enter the Target IPv4/CIDR/FQDN and you are ready
to go!

Some of the features included are:
- Recursive Basic FW/IPS Evasion
- Tuned Scan Timings
- Smart Top TCP and UDP Destination Ports
- Custom IP Payload Size
- Not Intrusive NSE scan by default
- Custom Source Port Scan
- Results Reports in XML and RTF with Full Scan Details
- SearchSploit NmapXML Ingestion

This script should work on any Distro that has Zsh+Nmap+Searchsploit, I
tested it on Kali Linux and it works flawlessly and efficiently.
It is a great tool for anyone who wants to perform Quick and Smart Network
Scans without compromising on quality or security.

If you are interested in trying out this script, you can find it on my
GitHub repository with GPL 3.0 License.
Here is the link: https://github.com/RezVIKONG/Nmap-FE
Feel free to download it, use it, modify it, or share it with others.

I would love to hear your feedback and suggestions on how to improve it
further.

Thank you for reading this post and I hope you enjoy using my Zsh script.
Happy Hacking! 😎

Renzo Donegani
_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at https://seclists.org/nmap-dev/

Current thread: