Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Leviathan36/trigmap
A wrapper for Nmap to quickly run network scans
https://github.com/Leviathan36/trigmap
nmap nmap-parser nmap-scripts penetration-testing pentest pentest-script pentest-tool pentesting pentesting-networks
Last synced: 21 days ago
JSON representation
A wrapper for Nmap to quickly run network scans
- Host: GitHub
- URL: https://github.com/Leviathan36/trigmap
- Owner: Leviathan36
- License: gpl-3.0
- Created: 2019-05-06T19:29:58.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2020-09-23T21:38:17.000Z (about 4 years ago)
- Last Synced: 2024-08-05T17:43:04.577Z (4 months ago)
- Topics: nmap, nmap-parser, nmap-scripts, penetration-testing, pentest, pentest-script, pentest-tool, pentesting, pentesting-networks
- Language: Shell
- Homepage:
- Size: 1.5 MB
- Stars: 146
- Watchers: 9
- Forks: 40
- Open Issues: 0
-
Metadata Files:
- Readme: README.MD
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - Leviathan36/trigmap - A wrapper for Nmap to quickly run network scans (Shell)
README
![Release](https://img.shields.io/badge/release-beta-yellow.svg)
![Language](https://img.shields.io/badge/made%20with-bash-brightgreen.svg)
![License](https://img.shields.io/badge/license-GPLv3-blue.svg)
![LastUpdate](https://img.shields.io/badge/last%20update-2019%2F05-orange.svg)
![TestedOn](https://img.shields.io/badge/tested%20on-Kali%20Linux-red.svg)
## About
Trigmap is a bash wrapper for Nmap. You can use it to easily run nmap scans and, especially, to collect information into a well organized directory hierarchy. The use of Nmap makes the script **portable** (easy to run not only on Kali Linux) and very **efficient** thanks to the optimized Nmap algorithms.## Details
Trigmap can performs several tasks using Nmap scripting engine (NSE):* **_Port Scan_**
* **_Service and Version Detection_**
* **_Web Resources Enumeration_**
* **_Vulnerability Assessment_**
* **_Common Vulnerabilities Test_**
* **_Common Exploits Test_**
* **_Dictionary Attacks Against Active Services_**
* **_Default Credentials Test_**## Usage
Trigmap can be used in two ways:* Interactive mode:
`trigmap [ENTER], and the script does the rest`
* NON-interactive mode:
`trigmap -h|--host [-tp|--tcp TCP ports] [-up|--udp UDP ports] [-f|--file file path] [-s|--speed time profile] [-n|--nic NIC] [-p|--phase phases]`
**If you want to see the help:**
`trigmap --help to print this helper`
_**For more screenshots see the relative [directory](https://github.com/Leviathan36/trigmap/tree/master/trigmap_images/screenshots) of the repository.**_
## Dir Hierarchy
## Customization
It's possible to customize the script by changing the value of variables at the beginning of the file.
In particularly you can choose the wordlists used by the Nmap scripts and the most important Nmap scan parameters (ping, scan, timing and script).```bash
##############################################
### PARAMETERS ###
##############################################
GENERAL_USER_LIST='general_user_wordlist_short.txt'
WIN_USER_LIST='win_user_wordlist_short.txt'
UNIX_USER_LIST='unix_user_wordlist_short.txt'
SHORT_PASS_LIST='fasttrack.txt'
LONG_PASS_LIST='passwords.lst'##############################################
### NMAP SETTING ###
############################################### PE (echo req), PP (timestamp-request)
# you can add a port on every ping scan
NMAP_PING='-PE -PS80,443,22,25,110,445 -PU -PP -PA80,443,22,25,110,445'NMAP_OTHER='-sV --allports -O --fuzzy --min-hostgroup 256'
SCRIPT_VA='(auth or vuln or exploit or http-* and not dos)'
SCRIPT_BRUTE='(auth or vuln or exploit or http-* or brute and not dos)'
SCRIPT_ARGS="userdb=$GENERAL_USER_LIST,passdb=$SHORT_PASS_LIST"
CUSTOM_SCAN='--max-retries 3 --min-rate 250' # LIKE UNICORNSCAN
```## Twin Brother
This project is very similar to [Kaboom](https://github.com/Leviathan36/kaboom), but it has a different philosophy; infact, it uses only Nmap, while Kaboom uses different tools, one for each task.
The peculiarity of Trigmap is the **portability** and the **efficient**, but it's recommended to use both the tools to
scan the targets in a such way to gather more evidence with different tools (_redundancy_ and _reliability_).
-------------------------------------
## Disclaimer:
Author assume no liability and are not responsible for any misuse or damage caused by this program.Trigmap is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
## License:
Trigmap is released under GPLv3 license. See [LICENSE](LICENSE) for more details.