π NMAP Automation Tool
This Tool automates and enhances Nmap scanning, offering an interactive, user-friendly interface with multiple scanning modes. It is designed for penetration testers, network security professionals, and ethical hackers who require precise and efficient reconnaissance.
βΈ»
β¨ Key Features & Functionalities
πΉ User-Friendly Interactive Menu β’ Displays a structured menu with color-coded options. β’ Allows users to select the desired scan type without needing to remember complex Nmap commands.
πΉ Preliminary Checks & Setup β’ Automatically verifies if Nmap is installed. β’ Provides easy-to-follow installation commands for different Linux distributions.
πΉ Multiple Scan Modes
1οΈβ£ Quick Scan β Performs a fast, lightweight scan to detect open ports. 2οΈβ£ Comprehensive Scan β Runs an in-depth scan, gathering service and OS details. 3οΈβ£ Stealth Scan β Uses TCP SYN scanning (-sS) to evade intrusion detection systems (IDS). 4οΈβ£ Service Detection β Identifies running services and their versions. 5οΈβ£ OS Detection β Tries to determine the operating system of the target machine. 6οΈβ£ Vulnerability Scan β Runs Nmapβs built-in vulnerability scripts to detect potential security risks. 7οΈβ£ Custom Scan β Allows users to customize scan parameters, including: β’ Scan type: TCP SYN, UDP, ACK, Window, and Maimon scans. β’ Timing templates: Paranoid, Sneaky, Polite, Normal, Aggressive, Insane. β’ Additional features: OS detection, service detection, verbose output, and script scanning. 8οΈβ£ Scan from File β Loads multiple targets from a file and scans them all at once.
βΈ»
βοΈ Installation & Usage
π½ Step 1: Install Nmap (If Not Installed)
Ensure Nmap is installed before running the script:
sudo apt update && sudo apt install nmap -y # Debian/Ubuntu
sudo yum install nmap -y # RHEL/CentOS
sudo pacman -S nmap # Arch Linux
π Step 2: Download & Run the Script
1οΈβ£ Make the script executable:
chmod +x nmap.sh
2οΈβ£ Run the script:
./nmap.sh
3οΈβ£ Select a scanning option and enter a target IP, hostname, or file.
βΈ»
π― Ideal For:
πΉ Ethical Hackers β Perform reconnaissance while maintaining stealth. πΉ Penetration Testers β Automate scanning in engagements. πΉ Network Administrators β Assess security vulnerabilities. πΉ Cybersecurity Researchers β Study network behaviors and response patterns.
βΈ»
π οΈ Customization & Contributions β’ Feel free to fork the repository and add new features. β’ Open issues and pull requests for improvements. β’ Contributions are always welcome and appreciated! π€
Happy Scanning! ππ‘οΈ