Skip to content

offseckit/nmap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

>_ osk nmap

Build nmap commands visually from your terminal.

Part of OffSecKit | Browser version | Unified CLI

Install

This tool is part of the OffSecKit CLI toolkit:

pip install offseckit

Usage

# Build a basic SYN scan command
osk nmap build -t 10.10.10.10

# Full port scan with version detection
osk nmap build -t 10.10.10.10 --all-ports -sV --open

# Use a preset profile
osk nmap preset quick -t 192.168.1.0/24

# Vulnerability scan preset
osk nmap preset vuln -t 10.10.10.10

# Stealth scan with evasion
osk nmap build -t 10.10.10.10 -s syn -T 2 -f --source-port 53

# List all presets, scan types, and timing templates
osk nmap presets
osk nmap scans
osk nmap timing

Options

Flag Description Default
-t, --target Target IP, hostname, or CIDR (required)
-s, --scan-type Scan type (syn, connect, udp, null, fin, xmas, ack, window) syn
-p, --ports Port specification top 1000
--top-ports Scan top N ports
--all-ports Scan all 65535 ports
-F, --fast Fast mode (top 100 ports)
-sV Service version detection
-O OS detection
-sC Default NSE scripts
-A Aggressive mode
-T Timing template (0-5) 3
--script NSE script(s)
--open Show only open ports
-f Fragment packets
-D Decoy addresses

Presets

Preset Description
quick Top 100 ports with version detection
full All 65535 ports with version detection
stealth Low-noise scan for monitored environments
vuln Version detection + vulnerability scripts
aggressive OS, versions, scripts, and traceroute
udp Top 100 UDP ports with version detection

Related

License

MIT

Releases

No releases published

Packages

 
 
 

Contributors