Kali Linux

Nmap-API : Uses Python3.10, Debian, python-Nmap, And Flask Framework To Create A Nmap API

Nmap-API uses python3.10, Debian, python-Nmap, and flask framework to create a Nmap API that can do scans with a good speed online and is easy to deploy. This is a implementation for our college PCL project which is still under development and constantly updating.

API Reference

Get all items

  GET /api/p1/{username}:{password}/{target}
  GET /api/p2/{username}:{password}/{target}
  GET /api/p3/{username}:{password}/{target}
  GET /api/p4/{username}:{password}/{target}
  GET /api/p5/{username}:{password}/{target}
ParameterTypeDescription
usernamestringRequired. username of the current user
passwordstringRequired. current user password
targetstringRequired. The target Hostname and IP
Document
FREE Guide

Master DevSecOps with an AppSec Platform: Learn How to Shift Everywhere

Learn how to shift everywhere and secure your applications at every stage of the software development life cycle.

Get item

  GET /api/p1/
  GET /api/p2/
  GET /api/p3/
  GET /api/p4/
  GET /api/p5/
ParameterReturn dataDescriptionNmap Command
p1jsonEffective Scan-Pn -sV -T4 -O -F
p2jsonSimple Scan-Pn -T4 -A -v
p3jsonLow Power Scan-Pn -sS -sU -T4 -A -v
p4jsonPartial Intense Scan-Pn -p- -T4 -A -v
p5jsonComplete Intense Scan-Pn -sS -sU -T4 -A -PE -PP -PS80,443 -PA3389 -PU40125 -PY -g 53 --script=vuln

Auth and User management

  POST /adduser/{admin-username}:{admin-passwd}/{id}/{username}/{passwd}
  POST /deluser/{admin-username}:{admin-passwd}/{t-username}/{t-userpass}
  POST /altusername/{admin-username}:{admin-passwd}/{t-user-id}/{new-t-username}
  POST /altuserid/{admin-username}:{admin-passwd}/{new-t-user-id}/{t-username}
  POST /altpassword/{admin-username}:{admin-passwd}/{t-username}/{new-t-userpass}
  • make sure you use the ADMIN CREDS MENTIONED BELOW
ParameterTypeDescription
admin-usernameStringAdmin username
admin-passwdStringAdmin password
idStringId for newly added user
usernameStringUsername of the newly added user
passwdStringPassword of the newly added user
t-usernameStringTarget username
t-user-idStringTarget userID
t-userpassStringTarget users password
new-t-usernameStringNew username for the target
new-t-user-idStringNew userID for the target
new-t-userpassStringNew password for the target

DEFAULT CREDENTIALS

ADMINISTRATOR : zAp6_oO~t428)@,

Please consider following and supporting us to stay updated with the latest info

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

15 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

15 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago