An open API service indexing awesome lists of open source software.

https://github.com/ms-0x404/nmap-tool

ScanMe is a simple and versitle script for network scan with nmap.
https://github.com/ms-0x404/nmap-tool

automation networking nmap nmap-scripts security-tools vulnerability vulnerability-scanners

Last synced: 3 months ago
JSON representation

ScanMe is a simple and versitle script for network scan with nmap.

Awesome Lists containing this project

README

          

# ScanMe v1.0.0

## 🚀 Overview
This Bash script allows you to quickly and efficiently perform a network scan using **Nmap**. The user can choose between different scanning modes to obtain detailed information about connected devices.

## 🎯 Features
- **TCP Scan (-sS -sV -Pn)** → Identifies running services
- **UDP Scan (-sU -Pn)** → Checks for available services on UDP
- **Full Scan (-p-)** → Analyzes all ports
- **Vulnerability Scan (-O --script vuln)** → Identifies potential vulnerabilities on the target

## 🛠️ Requirements
- Linux/macOS with **Bash**
- **Nmap** installed (install it using `sudo apt install nmap` on Debian/Ubuntu or `brew install nmap` on macOS)

## 📥 Installation
1. Clone this repository:
```bash
git clone https://github.com/your-username/ScanMe.git
cd ScanMe
```
2. Make the script executable:
```bash
chmod +x Scanme.sh
```

## ⚡ Usage
Run the script and choose the desired scanning mode:
```bash
./Scanme.sh
```
Then enter the required parameters:
1. **Scan Type** (tcp, udp, all, vuln)
2. **Target** (IP or domain to be scanned)

Example:
```bash
Parameters(tcp, udp, all, vuln(script)): tcp
Target: 192.168.1.1
```

## 📝 Output
The scan results will be saved in the `output.txt` file for future reference.

## ⚠️ Disclaimer
Improper use of Nmap may violate security policies. Ensure you have permission before scanning a network.

## 📜 License
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

---
**Author**: MagicSale - https://github.com/matteosalis04/

**Version**: v1.0.0