https://github.com/ms-0x404/nmap-tool
ScanMe is a simple and versitle script for network scan with nmap.
https://github.com/ms-0x404/nmap-tool
automation networking nmap nmap-scripts security-tools vulnerability vulnerability-scanners
Last synced: 3 months ago
JSON representation
ScanMe is a simple and versitle script for network scan with nmap.
- Host: GitHub
- URL: https://github.com/ms-0x404/nmap-tool
- Owner: MS-0x404
- License: mit
- Created: 2025-02-07T16:46:12.000Z (9 months ago)
- Default Branch: ScanMe-v1
- Last Pushed: 2025-05-04T07:51:59.000Z (6 months ago)
- Last Synced: 2025-06-15T12:07:50.294Z (5 months ago)
- Topics: automation, networking, nmap, nmap-scripts, security-tools, vulnerability, vulnerability-scanners
- Language: Shell
- Homepage:
- Size: 38.1 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ScanMe v1.0.0
## 🚀 Overview
This Bash script allows you to quickly and efficiently perform a network scan using **Nmap**. The user can choose between different scanning modes to obtain detailed information about connected devices.
## 🎯 Features
- **TCP Scan (-sS -sV -Pn)** → Identifies running services
- **UDP Scan (-sU -Pn)** → Checks for available services on UDP
- **Full Scan (-p-)** → Analyzes all ports
- **Vulnerability Scan (-O --script vuln)** → Identifies potential vulnerabilities on the target
## 🛠️ Requirements
- Linux/macOS with **Bash**
- **Nmap** installed (install it using `sudo apt install nmap` on Debian/Ubuntu or `brew install nmap` on macOS)
## 📥 Installation
1. Clone this repository:
```bash
git clone https://github.com/your-username/ScanMe.git
cd ScanMe
```
2. Make the script executable:
```bash
chmod +x Scanme.sh
```
## ⚡ Usage
Run the script and choose the desired scanning mode:
```bash
./Scanme.sh
```
Then enter the required parameters:
1. **Scan Type** (tcp, udp, all, vuln)
2. **Target** (IP or domain to be scanned)
Example:
```bash
Parameters(tcp, udp, all, vuln(script)): tcp
Target: 192.168.1.1
```
## 📝 Output
The scan results will be saved in the `output.txt` file for future reference.
## ⚠️ Disclaimer
Improper use of Nmap may violate security policies. Ensure you have permission before scanning a network.
## 📜 License
This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.
---
**Author**: MagicSale - https://github.com/matteosalis04/
**Version**: v1.0.0