Skip to content
Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.
Shell Roff
Branch: master
Clone or download

Latest commit

trimstray update .github
- signed-off-by: trimstray <trimstray@gmail.com>
Latest commit a7c4860 Nov 15, 2019

Files

Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github update .github Nov 15, 2019
bin moved modules and output dirs to data Apr 27, 2018
data added data/output to project Jan 3, 2019
etc #62 - updated prompt, minor fixes May 23, 2018
lib
log added log/ directory to project (not only locally) Jan 3, 2019
src #61 - control this using a _cmd_state variable May 22, 2018
static fix size of blackarch logo May 1, 2019
templates sample.mod - removed module version May 19, 2018
tmp #64 - added .gitkeep to tmp/ Jun 5, 2018
.gitignore added tmp/ to project Jan 3, 2019
.gitmodules added httprecon-nse submodule May 22, 2018
.travis.yml travis.yml - removed notifications Apr 18, 2018
LICENSE.md fixed typos Jan 22, 2019
README.md update paths Nov 15, 2019
setup.sh changed directory for static files Mar 25, 2019

README.md

sandmap

Travis-CI Version Rawsec's CyberSecurity Inventory BlackArch Repository License

DescriptionHow To UseCommand LineConfigurationRequirementsOtherContributingLicenseWiki

Master

Created by trimstray and contributors

Description

sandmap is a tool supporting network and system reconnaissance using the massive Nmap engine. It provides a user-friendly interface, automates and speeds up scanning and allows you to easily use many advanced scanning techniques.

Key Features

  • simple CLI with the ability to run pure Nmap engine
  • predefined scans included in the modules
  • support Nmap Scripting Engine (NSE) with scripts arguments
  • TOR support (with proxychains)
  • multiple scans at one time
  • at this point: 31 modules with 459 scan profiles

How To Use

It's simple:

# Clone this repository
git clone --recursive https://github.com/trimstray/sandmap

# Go into the repository
cd sandmap

# Install
./setup.sh install

# Run the app
sandmap
  • symlink to bin/sandmap is placed in /usr/local/bin
  • man page is placed in /usr/local/man/man8

Command Line

Before using the sandmap read the Command Line introduction.

Configuration

The etc/main.cfg configuration file has the following structure:

# shellcheck shell=bash

# Specifies the default destination.
# Examples:
#   - dest="127.0.0.1,8.8.8.8"
dest="127.0.0.1"

# Specifies the extended Nmap parameters.
# Examples:
#   - params="--script ssl-ccs-injection -p 443"
params=""

# Specifies the default output type and path.
# Examples:
#   - report="xml"
report=""

# Specifies the TOR connection.
# Examples:
#   - tor="true"
tor=""

# Specifies the terminal type.
# Examples:
#   - terminal="internal"
terminal="internal"

Requirements

sandmap uses external utilities to be installed before running:

This tool working with:

  • GNU/Linux (testing on Debian and CentOS)
  • Bash (testing on 4.4.19)
  • Nmap (testing on 7.70)

Also you will need root access.

Other

Modules

Available modules: 31 Available scan profiles: 459

If you want to create your own modules, take a look this.

Project architecture

See this.

Contributing

See this.

License

GPLv3 : http://www.gnu.org/licenses/

Free software, Yeah!

You can’t perform that action at this time.