{"id":16971570,"url":"https://github.com/thomastjdev/python_nmap_integration","last_synced_at":"2025-10-08T11:27:54.293Z","repository":{"id":87657549,"uuid":"79671930","full_name":"ThomasTJdev/python_nmap_integration","owner":"ThomasTJdev","description":"Python script for plug and play nmap scans (using nmap, not the library)","archived":false,"fork":false,"pushed_at":"2017-01-21T20:48:09.000Z","size":61,"stargazers_count":0,"open_issues_count":0,"forks_count":2,"subscribers_count":3,"default_branch":"master","last_synced_at":"2025-01-26T14:48:37.943Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"Shell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ThomasTJdev.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2017-01-21T20:48:01.000Z","updated_at":"2017-01-21T20:48:47.000Z","dependencies_parsed_at":"2023-03-13T18:40:18.414Z","dependency_job_id":null,"html_url":"https://github.com/ThomasTJdev/python_nmap_integration","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ThomasTJdev%2Fpython_nmap_integration","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ThomasTJdev%2Fpython_nmap_integration/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ThomasTJdev%2Fpython_nmap_integration/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ThomasTJdev%2Fpython_nmap_integration/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ThomasTJdev","download_url":"https://codeload.github.com/ThomasTJdev/python_nmap_integration/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":244860611,"owners_count":20522466,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-10-14T00:52:37.639Z","updated_at":"2025-10-08T11:27:49.246Z","avatar_url":"https://github.com/ThomasTJdev.png","language":"Shell","readme":"Script wrapped around nmap for quick scanning\n=============================================\n\nExamples\n--------\n  Example: sudo ./nmap.sh 1 192.168.1.1 save  \n  Example: sudo ./nmap.sh 1 192.168.1.1 save data-25 verbose3  \n  Example: sudo ./nmap.sh {scantype} {DST IP} {arguments}  \n\n\nRequired arguments\n------------------\n  1 argument: scan type  \n  2 argument: target ip  \n\n\nScan types\n----------\n  1) Intense scan  \n  2) Intense scan plus UDP  \n  3) Intense scan, all TCP ports  \n  4) Intense scan, all TCP ports  \n  5) Ping scan  \n  6) Quick scan  \n  7) Quick scan plus  \n  8) Quick traceroute  \n  9) Regular scan  \n  10) Slow comprehensive scan  \n  11) OS detection  \n  12) OS detection limit  \n  13) HTTP Service Information  \n  14) Service detection  \n\n\nOptional arguments\n------------------\n  save                = Save results to XML for zenmap import  \n  defscript           = Use default scripts  \n  decoy               = Randomize SRC ip  \n  data-[bytesize]     = Append data to packets (avoiding firewall detection)  \n  random              = Randomize host and port order (avoiding firewall detection)  \n  mac                 = Spoof MAC address (random)  \n  badsum              = Bad checksum, this might give a failure in scan (avoiding firewall detection)  \n  zombie-[target ip]  = Idle zombie scan. Find a idle device, e.g. printer, and use as a host  \n  sourceport-[port]   = Use other port for scan, might fail. Common ports 20,53 and 67.  \n  verbose3            = Verbose level 3  \n  port-[port]         = Scan specific port  \n\n\nOptional scripts\n----------------\n  s-bfdns             = Find sub-domains. The dns-brute.nse script will find valid DNS (A) records by trying a list of common sub-domains and finding those that successfully resolve. (port 80 used)  \n  s-hostsip           = Find virtual hosts on an IP address (port 80 used)  \n  s-trgeo             = Traceroute ip (port 80 used)  \n  s-bfpath            = Brute forces a web server path (WARNING NOT STEALTHY)  \n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fthomastjdev%2Fpython_nmap_integration","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fthomastjdev%2Fpython_nmap_integration","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fthomastjdev%2Fpython_nmap_integration/lists"}