Skip to content

Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs default scripts. Built with CTFs in mind.

Notifications You must be signed in to change notification settings

Purp1eW0lf/Masscan_to_Nmap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 

Repository files navigation

Masscan_to_Nmap

Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs default scripts. Built with CTFs in mind.

Description

My main process for CTFs was to run Masscan, which would find the TCP & UDP ports that were open on a target. I'd then copy and paste those open ports, and ask Nmap to run those ports and find the service versions and run the default enumeration scripts.

I wanted to automate this, so I could just fire off a script with a given IP and then go and make a coffee whilst it runs. This script prints out the Nmap results and also saves a copy in your directory as well.

Installation

wget https://raw.githubusercontent.com/Purp1eW0lf/Masscan_to_Nmap/main/masscan_to_nmap.py

Usage

sudo python3 masscan_to_nmap.py -i 10.10.10.11

Adding the -n flag will specify the network, such as eth0 or tun0. If you don't specify a network flag, it will take tun0 as the default network to use.

options

Examples

Masscan_Nmap

Known Issues

Masscan can hang and start counting into the minus numbers. It normally resolves itself under 'minus' 200 seconds, if not sooner. It's a masscan issue, related to scanning when using a VPN.

Contact

If you notice a way the script can be improved you're welcome to make requests and raise issues.

You're also welcome to slide in my Twitter DMs and tell me how shit the scanner is. @Purp1eW0lf

License

This tool is free to use. Do not use for illegal purposes. Only use for academic purposes, on computers that you have permission to access.

About

Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs default scripts. Built with CTFs in mind.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages