https://github.com/hackunderway/nmapscan
Tool to use Nmap, in Flask with different types of scans. π
https://github.com/hackunderway/nmapscan
flask nmap python
Last synced: 3 months ago
JSON representation
Tool to use Nmap, in Flask with different types of scans. π
- Host: GitHub
- URL: https://github.com/hackunderway/nmapscan
- Owner: HackUnderway
- License: mit
- Created: 2024-11-08T03:37:06.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-11-08T04:32:10.000Z (8 months ago)
- Last Synced: 2025-03-26T01:01:44.304Z (4 months ago)
- Topics: flask, nmap, python
- Language: CSS
- Homepage:
- Size: 604 KB
- Stars: 9
- Watchers: 1
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# NmapScan
Tool to use Nmap, in Flask with different types of scans. π[](https://www.facebook.com/HackUnderway/)



> **The project is open to partners.**
# SUPPORTED DISTRIBUTIONS
|Distribution | Version Check | supported | status |
----------|-------|------|-------|
|Kali Linux| 2024.3| yes| working |
|Parrot Security OS| 6.0| yes | working |
|Windows| 11 | yes | working |
|BackBox| 8.1 | yes | working |
|Arch Linux| 2024.06.01 | yes | working |# Root privileges:
To run some types of advanced scans with Nmap (such as -sS, -O, -A), sudo is required. Make sure that the user running the application has the necessary permissions or configure sudo to not prompt for a password when running Nmap (this should be done with caution).# System Settings:
Sudo permissions without password (optional): If you want to prevent Flask from requesting the sudo password when running certain scans, you can configure sudo to allow the user to run nmap without a password:
```
sudo visudo
```
Then, add a line like the following to the end of the file (replace username with the system user name):
```
username ALL=(ALL) NOPASSWD: /usr/bin/nmap
```# Solutions:
Run the program as sudo: Since the Flask application is running the Nmap command and it needs root permissions, a straightforward solution is to run Flask with sudo:## Example:
```
sudo python3 app.py
```However, this is not the most secure solution, especially in a production environment. If you decide to use this method, make sure it is only enabled in controlled environments.
Assign specific permissions to Nmap using setcap: If you want to avoid running the entire Flask script with sudo, you can grant specific permissions to Nmap to run without needing root permissions for certain scans:
```
sudo setcap cap_net_raw,cap_net_admin,cap_net_bind_service+eip $(which nmap)
```
# USAGE
```
git clone https://github.com/HackUnderway/NmapScan.git
```
```
cd NmapScan
```
```
python3 nmap_scan.py
```
# REQUIREMENTS
```
pip install -r requirements.txt
```
# SUPPORT
Questions, bugs or suggestions to : [email protected]# LICENSE
- [x] NmapScan is licensed.
- [x] See [LICENSE](https://github.com/HackUnderway/NmapScan#MIT-1-ov-file) for more information.We need partners and sponsors, if you're interested in support or help contact.
# SECURITY RESEARCHER
* Victor Bancayan - [@VictorBancayan](https://twitter.com/VictorBancayan) - (**CEO at [Hack Underway](https://www.instagram.com/hackunderway/)**)
## π LINKS
[](https://www.patreon.com/c/HackUnderway)
```
Fanpage: https://www.facebook.com/HackUnderway
X: https://twitter.com/JeyZetaOficial
Web site: https://hackunderway.com
Youtube: https://www.youtube.com/@JeyZetaOficial
```
[](https://www.facebook.com/HackUnderway/)from
made in
with
by: Victor Bancayan, if you want Donate
Β© 2024