AutoNmap is a robust script designed to conduct thorough Nmap scans against specified targets or lists of targets. It wraps Nmap commands into a user-friendly interface, adding error handling and enhanced feedback to improve usability and reliability.
Ensure you have nmap
and xsltproc
installed on your system, as these are required for the script to function properly.
Clone the GitHub repository to get the latest version of AutoNmap:
git clone --recursive https://github.com/cthulhu897/autonmap.git
Navigate to the directory where the script is located:
cd autonmap
Run the script as root to ensure it has the necessary permissions to perform network scans:
sudo /opt/autonmap/autonmap.sh -o <output_name> -t <target>
or from your current directory:
sudo ./autonmap.sh -o <output_name> -t <target>
-h
: Display help information.-o
: Specify the base name for files to save scan results.-t
: Specify the target IP, CIDR, or pass an input file with-iL file.lst
for complex ranges.
Here are some example commands to get you started:
-
Scan a single IP address:
sudo ./autonmap.sh -o localhost -t 127.0.0.1
-
Scan multiple IP addresses from a list:
sudo ./autonmap.sh -o myhome -t "-iL myhomestaticipaddreses.txt"
The script generates several files based on the provided output name, including:
- A list of alive hosts (
<output_name>_alive.lst
) - Detailed port scans (
<output_name>_ports.nmap
) - A comprehensive service scan (
<output_name>_final.nmap
) - An HTML report (
<output_name>_report.html
), providing an easy-to-read overview of the scan results.
You can modify the TCP and UDP port ranges directly within the script to customize the scope of your scans based on specific requirements or network environments.
Ensure you have permission to scan the network and host you target with AutoNmap. Unauthorized scanning can lead to legal repercussions and be considered hostile by network administrators.
Contributions are welcome! Please fork the repository and submit a pull request with your enhancements.
GPL 3.0