/NmapLite

Quick access menu for the nmap

Primary LanguagePythonMIT LicenseMIT

NmapLite - Your Lightweight Nmap Command Organizer

NmapLite is designed to streamline your experience with Nmap by providing a user-friendly menu system. It simplifies the navigation process and enhances accessibility to Nmap commands.


Explore Various Scans Effortlessly

  1. Intense Scan: A thorough scan to uncover essential information.

  2. Intense Scan plus UDP: Extends the intense scan to include UDP ports, broadening the scope of your reconnaissance.

  3. Intense Scan, All TCP Ports: Comprehensive scan covering all TCP ports for a more in-depth analysis.

  4. Intense Scan, No Ping: Execute an intense scan without sending ping probes, useful for stealthier operations.

  5. Ping Scan: Quickly discover live hosts on the network using ICMP echo requests.

  6. Quick Scan: Swiftly scan common ports to identify potential targets efficiently.

  7. Quick Scan Plus: Enhanced quick scan offering additional insights into open ports and services.

  8. Quick Traceroute: Trace the path packets take to reach their destination, aiding in network troubleshooting.

  9. Regular Scan: Standard scan providing a balance between thoroughness and speed.

  10. Slow Comprehensive Scan: Delve deep into network analysis with a meticulous scan that examines various aspects thoroughly.

  11. Scan Specific Ports: Target specific ports for a focused scan.

  12. Service Version Detection: Identify versions of the services running on open ports.

  13. OS Detection: Determine the operating system of the target.

  14. Aggressive Scan: Conduct a detailed scan that combines various advanced Nmap options.

  15. Detect Firewall: Identify potential firewall configurations using specialized scripts.

  16. Scan for Vulnerabilities: Check for known vulnerabilities using Nmap scripts.

  17. Scan for Malware: Detect possible malware on the network with dedicated scripts.

  18. Scan with NSE Scripts: Utilize Nmap Scripting Engine (NSE) scripts for custom scanning.

  19. Detect Heartbleed Vulnerability: Specifically check for the Heartbleed vulnerability.

  20. Traceroute and Geolocation: Perform traceroute and determine geolocation of IP addresses.


Getting Started

To begin utilizing NmapLite, follow these simple steps:

  1. Clone the Repository: Obtain the latest version of NmapLite by cloning the repository.

    git clone https://github.com/mikropsoft/NmapLite.git
  2. Navigate to the Directory: Move into the NmapLite directory.

    cd NmapLite
  3. Execute the Script: Run the main Python script with elevated privileges.

    sudo python main.py

Contributing

Contributions are welcome! Please feel free to fork the repository and submit pull requests to contribute new features, improvements, or bug fixes.


License

This project is licensed under the MIT License.