{"id":13495961,"url":"https://github.com/trimstray/sandmap","last_synced_at":"2025-05-14T14:10:10.462Z","repository":{"id":39420346,"uuid":"126193885","full_name":"trimstray/sandmap","owner":"trimstray","description":"Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.","archived":false,"fork":false,"pushed_at":"2024-11-19T14:07:51.000Z","size":16345,"stargazers_count":1644,"open_issues_count":10,"forks_count":223,"subscribers_count":42,"default_branch":"master","last_synced_at":"2025-04-12T10:19:12.043Z","etag":null,"topics":["backbox","blackarch","blackarch-packages","cli","command-line","hacking","hacking-tool","information-gathering","kali-linux","kali-scripts","linux","network-discovery","network-scanner","nmap","nmap-scripts","nse","nsescript","port-scanner","service-discovery"],"latest_commit_sha":null,"homepage":"","language":"Shell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/trimstray.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":".github/CONTRIBUTING.md","funding":null,"license":"LICENSE.md","code_of_conduct":".github/CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2018-03-21T14:45:25.000Z","updated_at":"2025-04-10T15:55:00.000Z","dependencies_parsed_at":"2024-12-05T13:12:35.032Z","dependency_job_id":null,"html_url":"https://github.com/trimstray/sandmap","commit_stats":null,"previous_names":[],"tags_count":7,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/trimstray%2Fsandmap","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/trimstray%2Fsandmap/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/trimstray%2Fsandmap/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/trimstray%2Fsandmap/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/trimstray","download_url":"https://codeload.github.com/trimstray/sandmap/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254160557,"owners_count":22024571,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["backbox","blackarch","blackarch-packages","cli","command-line","hacking","hacking-tool","information-gathering","kali-linux","kali-scripts","linux","network-discovery","network-scanner","nmap","nmap-scripts","nse","nsescript","port-scanner","service-discovery"],"created_at":"2024-07-31T19:01:40.143Z","updated_at":"2025-05-14T14:10:05.437Z","avatar_url":"https://github.com/trimstray.png","language":"Shell","readme":"\u003ch1 align=\"center\"\u003esandmap\u003c/h1\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003ca href=\"https://travis-ci.org/trimstray/sandmap\"\u003e\n    \u003cimg src=\"https://travis-ci.org/trimstray/sandmap.svg?branch=master\" alt=\"Travis-CI\"\u003e\n  \u003c/a\u003e\n  \u003ca href=\"https://img.shields.io/badge/Version-v1.2.0-lightgrey.svg\"\u003e\n    \u003cimg src=\"https://img.shields.io/badge/Version-v1.2.0-lightgrey.svg\" alt=\"Version\"\u003e\n  \u003c/a\u003e\n  \u003ca href=\"https://inventory.rawsec.ml/tools.html#Sandmap\"\u003e\n    \u003cimg src=\"https://inventory.rawsec.ml/img/badges/Rawsec-inventoried-FF5050_flat.svg\" alt=\"Rawsec's CyberSecurity Inventory\"\u003e\n  \u003c/a\u003e\n  \u003ca href=\"https://blackarch.org/tools.html\"\u003e\n    \u003cimg src=\"https://img.shields.io/badge/BlackArch-available-red.svg\" alt=\"BlackArch Repository\"\u003e\n  \u003c/a\u003e\n  \u003ca href=\"http://www.gnu.org/licenses/\"\u003e\n    \u003cimg src=\"https://img.shields.io/badge/license-GNU-blue.svg\" alt=\"License\"\u003e\n  \u003c/a\u003e\n\u003c/p\u003e\n\n\u003ch5 align=\"center\"\u003e\n   \u003ca href=\"#description\"\u003eDescription\u003c/a\u003e\n • \u003ca href=\"#how-to-use\"\u003eHow To Use\u003c/a\u003e\n • \u003ca href=\"#command-line\"\u003eCommand Line\u003c/a\u003e\n • \u003ca href=\"#configuration\"\u003eConfiguration\u003c/a\u003e\n • \u003ca href=\"#requirements\"\u003eRequirements\u003c/a\u003e\n • \u003ca href=\"#other\"\u003eOther\u003c/a\u003e\n • \u003ca href=\"#contributing\"\u003eContributing\u003c/a\u003e\n • \u003ca href=\"#license\"\u003eLicense\u003c/a\u003e\n • \u003ca href=\"https://github.com/trimstray/sandmap/wiki\"\u003eWiki\u003c/a\u003e\n\u003c/h5\u003e\n\n\u003cbr\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://i.imgur.com/9a97M2S.gif\" alt=\"Master\"\u003e\n\u003c/p\u003e\n\n\u003cbr\u003e\n\n## Description\n\n`sandmap` is a tool supporting network and system reconnaissance using the massive **Nmap engine**. It provides a user-friendly interface, automates and speeds up scanning and allows you to easily use many advanced scanning techniques.\n\n### Key Features\n\n- simple **CLI** with the ability to run pure **Nmap engine**\n- predefined scans included in the **modules**\n- support **Nmap Scripting Engine** (NSE) with scripts arguments\n- **TOR** support (with proxychains)\n- multiple scans at one time\n- at this point: **31** modules with **459** scan profiles\n\n## How To Use\n\nIt's simple:\n\n```bash\n# Clone this repository\ngit clone --recursive https://github.com/trimstray/sandmap\n\n# Go into the repository\ncd sandmap\n\n# Install\n./setup.sh install\n\n# Run the app\nsandmap\n```\n\n\u003e * symlink to `bin/sandmap` is placed in `/usr/local/bin`\n\u003e * man page is placed in `/usr/local/man/man8`\n\n## Command Line\n\nBefore using the `sandmap` read the **\u003ca href=\"https://github.com/trimstray/sandmap/wiki/CLI\"\u003eCommand Line\u003c/a\u003e** introduction.\n\n## Configuration\n\nThe `etc/main.cfg` configuration file has the following structure:\n\n```bash\n# shellcheck shell=bash\n\n# Specifies the default destination.\n# Examples:\n#   - dest=\"127.0.0.1,8.8.8.8\"\ndest=\"127.0.0.1\"\n\n# Specifies the extended Nmap parameters.\n# Examples:\n#   - params=\"--script ssl-ccs-injection -p 443\"\nparams=\"\"\n\n# Specifies the default output type and path.\n# Examples:\n#   - report=\"xml\"\nreport=\"\"\n\n# Specifies the TOR connection.\n# Examples:\n#   - tor=\"true\"\ntor=\"\"\n\n# Specifies the terminal type.\n# Examples:\n#   - terminal=\"internal\"\nterminal=\"internal\"\n```\n\n## Requirements\n\n`sandmap` uses external utilities to be installed before running:\n\n- [nmap](https://nmap.org/)\n- [xterm](https://invisible-island.net/xterm/)\n- [proxychains](http://proxychains.sourceforge.net/)\n\nThis tool working with:\n\n- **GNU/Linux** (testing on Debian and CentOS)\n- **Bash** (testing on 4.4.19)\n- **Nmap** (testing on 7.70)\n\nAlso you will need **root access**.\n\n## Other\n\n### Modules\n\nAvailable modules: **31**\nAvailable scan profiles: **459**\n\n\u003e If you want to create your own modules, take a look **[this](https://github.com/trimstray/sandmap/wiki/Modules)**.\n\n### Project architecture\n\nSee **[this](https://github.com/trimstray/sandmap/wiki/Project-architecture)**.\n\n## Contributing\n\nSee **[this](.github/CONTRIBUTING.md)**.\n\n## License\n\nGPLv3 : \u003chttp://www.gnu.org/licenses/\u003e\n\n**Free software, Yeah!**\n","funding_links":[],"categories":["Shell","Recon","Related Lists","Shell (473)","\u003ca id=\"a76463feb91d09b3d024fae798b92be6\"\u003e\u003c/a\u003e侦察\u0026\u0026信息收集\u0026\u0026子域名发现与枚举\u0026\u0026OSINT","\u003ca id=\"170048b7d8668c50681c0ab1e92c679a\"\u003e\u003c/a\u003e工具","linux","Pentesting"],"sub_categories":["Port Scanning","\u003ca id=\"94c01f488096fafc194b9a07f065594c\"\u003e\u003c/a\u003enmap","ARM"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ftrimstray%2Fsandmap","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Ftrimstray%2Fsandmap","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ftrimstray%2Fsandmap/lists"}