Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/trimstray/sandmap

Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
https://github.com/trimstray/sandmap

backbox blackarch blackarch-packages cli command-line hacking hacking-tool information-gathering kali-linux kali-scripts linux network-discovery network-scanner nmap nmap-scripts nse nsescript port-scanner service-discovery

Last synced: 25 days ago
JSON representation

Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.

Awesome Lists containing this project

README

        

sandmap



Travis-CI


Version


Rawsec's CyberSecurity Inventory


BlackArch Repository


License


Description
How To Use
Command Line
Configuration
Requirements
Other
Contributing
License
Wiki



Master


Created by
trimstray and
contributors


## Description

`sandmap` is a tool supporting network and system reconnaissance using the massive **Nmap engine**. It provides a user-friendly interface, automates and speeds up scanning and allows you to easily use many advanced scanning techniques.

### Key Features

- simple **CLI** with the ability to run pure **Nmap engine**
- predefined scans included in the **modules**
- support **Nmap Scripting Engine** (NSE) with scripts arguments
- **TOR** support (with proxychains)
- multiple scans at one time
- at this point: **31** modules with **459** scan profiles

## How To Use

It's simple:

```bash
# Clone this repository
git clone --recursive https://github.com/trimstray/sandmap

# Go into the repository
cd sandmap

# Install
./setup.sh install

# Run the app
sandmap
```

> * symlink to `bin/sandmap` is placed in `/usr/local/bin`
> * man page is placed in `/usr/local/man/man8`

## Command Line

Before using the `sandmap` read the **Command Line** introduction.

## Configuration

The `etc/main.cfg` configuration file has the following structure:

```bash
# shellcheck shell=bash

# Specifies the default destination.
# Examples:
# - dest="127.0.0.1,8.8.8.8"
dest="127.0.0.1"

# Specifies the extended Nmap parameters.
# Examples:
# - params="--script ssl-ccs-injection -p 443"
params=""

# Specifies the default output type and path.
# Examples:
# - report="xml"
report=""

# Specifies the TOR connection.
# Examples:
# - tor="true"
tor=""

# Specifies the terminal type.
# Examples:
# - terminal="internal"
terminal="internal"
```

## Requirements

`sandmap` uses external utilities to be installed before running:

- [nmap](https://nmap.org/)
- [xterm](https://invisible-island.net/xterm/)
- [proxychains](http://proxychains.sourceforge.net/)

This tool working with:

- **GNU/Linux** (testing on Debian and CentOS)
- **Bash** (testing on 4.4.19)
- **Nmap** (testing on 7.70)

Also you will need **root access**.

## Other

### Modules

Available modules: **31**
Available scan profiles: **459**

> If you want to create your own modules, take a look **[this](https://github.com/trimstray/sandmap/wiki/Modules)**.

### Project architecture

See **[this](https://github.com/trimstray/sandmap/wiki/Project-architecture)**.

## Contributing

See **[this](.github/CONTRIBUTING.md)**.

## License

GPLv3 :

**Free software, Yeah!**