nmapAutomator : A Script That You Can Run In The Background

nmapAutomator is a script that you can run in the background. The main goal for this script is to automate all of the process of recon/enumeration that is run every time, and instead focus our attention on real pen testing.

This will ensure two things:

  • Automate nmap scans.
  • Always have some recon running in the background.

Once you find the initial ports in around 10 seconds, you then can start manually looking into those ports, and let the rest run in the background with no interaction from your side whatsoever.

Features

  • Quick: Shows all open ports quickly (~15 seconds)
  • Basic: Runs Quick Scan, then a runs more thorough scan on found ports (~5 minutes)
  • UDP: Runs “Basic” on UDP ports (~5 minutes)
  • Full: Runs a full range port scan, then runs a thorough scan on new ports (~5-10 minutes)
  • Vulns: Runs CVE scan and nmap Vulns scan on all found ports (~5-15 minutes)
  • Recon: Runs “Basic” scan “if not yet run”, then suggests recon commands “i.e. gobuster, nikto, smbmap” based on the found ports, then prompts to automatically run them
  • All: Runs all the scans consecutively (~20-30 minutes)

I tried to make the script as efficient as possible, so that you would get the results as fast as possible, without duplicating any work.

Requirements

Required: Gobuster v3.0 or higher, as it is not backward compatible.
You can update gobuster on kali using:

apt-get update
apt-get install gobuster –only-upgrade

Examples Of Use

./nmapAutomator.sh
./nmapAutomator.sh 10.1.1.1 All
./nmapAutomator.sh 10.1.1.1 Basic
./nmapAutomator.sh 10.1.1.1 Recon

If you want to use it anywhere on the system, create a shortcut using:

ln -s /PATH-TO-FOLDER/nmapAutomator.sh /usr/local/bin/

R K

Recent Posts

What is SIEM? Complete Guide to Security Information and Event Management

Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…

3 hours ago

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

15 hours ago

Top OSINT Tools to Find Emails, Usernames and Passwords

Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…

1 day ago

Google Dorking in Cybersecurity: A Complete Guide

Introduction In the vast ocean of the internet, the most powerful tool you already have…

2 days ago

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

2 weeks ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

2 weeks ago