https://github.com/matteosalis04/neoscan
NeoScan is a simple and versatile bash script for performing network scans using `nmap`.
https://github.com/matteosalis04/neoscan
bash bash-script networking nmap nmap-scan-script vulnerability
Last synced: about 1 year ago
JSON representation
NeoScan is a simple and versatile bash script for performing network scans using `nmap`.
- Host: GitHub
- URL: https://github.com/matteosalis04/neoscan
- Owner: matteosalis04
- License: mit
- Created: 2024-12-17T10:37:50.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2025-01-28T20:26:09.000Z (about 1 year ago)
- Last Synced: 2025-01-28T20:32:14.574Z (about 1 year ago)
- Topics: bash, bash-script, networking, nmap, nmap-scan-script, vulnerability
- Language: Shell
- Homepage:
- Size: 11.7 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# NeoScan v3.0.0 - Advanced Nmap Scanning Tool
## 🎯 Overview
A complete script revision that introduces a modular structure, advanced security checks, and improved output management.
## 🚀 Major Changes
- Complete code restructuring with modular architecture
- Introduction of security checks and validation
- Flexible output management system
- New ASCII art banner
- Full English language support
## ✨ New Features
- **Security Checks**:
- Automatic root permissions verification
- nmap installation check with auto-install capability
- Robust target and parameter validation
- **File Management**:
- Scan-type specific outputs (scan_tcp.txt, scan_udp.txt, etc.)
- Custom directory support
- Flexible path handling
- **UX Improvements**:
- Username and timestamp display
- More descriptive error messages
- Clear output file path feedback
- Professional banner with project information
## 🔧 Technical Improvements
- Introduction of modular functions:
- `input()`: user input handling
- `check_parameter()`: parameter validation
- `check_target()`: IP/hostname validation
- `comands()`: scan execution
- `complete()`: completion handling
- `main()`: workflow orchestration
## ⚙️ Technical Requirements
- Bash shell
- Root privileges
- nmap installed
## 📝 Usage
```bash
sudo ./NeoScan.sh
Available scan types:
- tcp (TCP scan with service version detection)
- udp (UDP scan)
- all (Full port scan)
- vuln (Vulnerability scan)