Files
nmap/nmap.py
Greg Hendrickson ccbf4a351a Update nmap.py
2023-01-24 05:53:25 -08:00

56 lines
1.9 KiB
Python

#!/usr/bin/python
import os
# Global Elite(variables)
addOaValid = "0"
oaAdder = ""
# Functions
def fpingTxt():
fpingTarget = input("Set fping range for scan: (192.168.1.0-254)")
os.system("cd && rm ~/fping.txt") # Combine multiple commands into one line
os.system(f"fping -a -g {fpingTarget} >> fping.txt")
print("fping should be finished now!")
def menu():
print("""
#############################
# #
# CHOOSE ARGUMENTS #
# FOR NMAP #
# #
#############################
This is a list of precompiled slightly modular cmds
By default all NMAP cmds are set to -T4
-T4 sends packets at an aggressive rate or 1.25p/s
#############################
0. HOST DISCOVERER - USES NMAP TO CHECK IF TARGET(s) ARE ALIVE
1. FULL SCAN - ALL PORTS (0-65,535)
2. TCP CONNECT, OS, DETAILED SERVICE SCAN FOR OPEN PORTS
3. VIOLATE TCP CONNECTION WITH XMAS
4. MASSCAN PORT 80 OF TARGET(s)
Anything else to exit.
#############################
""")
def menuSelector():
menuChoice = input("Choose from above")
if menuChoice == "0": print("0.Selected Host Discoverer...")
elif menuChoice == "1": print("1.Selected Full Scan...")
elif menuChoice == "2": print("2.Selected TCP Connect...")
elif menuChoice == "3": print("3.Selected TCP Violation...")
elif menuChoice == "4": print("4.Selected Masscan...")
else: print("Exiting...")
return menuChoice
def cmdList():
menuChoice = menuSelector()
os.system("cd")
if menuChoice == "0": os.system("nmap -T4 -sn -iL ~/fping.txt %s" % oaAdder)
elif menuChoice == "1": os.system("nmap -T4 -p- -iL ~/fping.txt %s" % oaAdder)
elif menuChoice == "2": os.system("nmap -T4 -O -sT -sV -iL ~/fping.txt %s" % oaAdder)
elif menuChoice == "3": os.system("nmap -T4 -sX -iL ~/fping.txt %s" % oaAdder)
elif menuChoice == "4": os.system("masscan -p80 -iL ~/fping.txt %s" % oaAdder)