A tool for parsing and dynamically querying nmap scan data
Project description
# NMAP Query Tool
Post-processor for nmap output that allows fast, simple filtering of data both interactively and inline (i.e. via a bash pipe).
```bash
Usage: python nmap-query.py [-h] [-p PORTS] [-a IPS] [-os OS] [-d DEVICE_TYPE] [-c] [-i NMAP_SCAN_RESULTS_FILE] [-o OUTPUT_FILENAME] [-q]
Note: the nmap scan results can be provided either through an input file or from STDIN (through a pipe)
Example: nmap -sV 10.0.0.0/24 | python nmap-query.py -q
[-h | --help]: Will print the help/usage message
[-p | --ports] PORTS: specify one or more (open) ports to filter on. The following input formats are accepted:
Single port number: -p 22
Set of port numbers: -p 22,80,443
[-a | --ip-addrs] IPS: specify one or more IP addresses on which to filter. The following input formats are accepted:
Single IP: -a 10.0.0.1
Set of IPs: -a 10.0.0.1,10.0.0.2,10.0.0.3
Single CIDR block: -a 10.0.0.0/24
Set of CIDR blocks: -a 10.0.0.0/24,10.0.1.0/24
Range of IPs: -a 10.0.0.1-4
[-os | --operating-system] OS: specify one or more operating systems on which to filter. The following input formats are accepted:
Single operating system: -os Windws
Set of operating systems: -os Windows,Linux
[-d | --device-type] DEVICE_TYPE: specify one or more device types on which to filter. The following input formats are accepted:
Single device type: -d router
Set of device types: -d router,switch
[-c | --output-csv]: use CSV as the output format
[-i | --input-file] NMAP_SCAN_RESULTS_FILE: specify the name of the input file (i.e. the file which contains the results of the Nmap scan)
[-o | --output-file] OUTPUT_FILENAME: specify the name of the output file
[-q | --query-mode]: enter the interactive query mode
```
Post-processor for nmap output that allows fast, simple filtering of data both interactively and inline (i.e. via a bash pipe).
```bash
Usage: python nmap-query.py [-h] [-p PORTS] [-a IPS] [-os OS] [-d DEVICE_TYPE] [-c] [-i NMAP_SCAN_RESULTS_FILE] [-o OUTPUT_FILENAME] [-q]
Note: the nmap scan results can be provided either through an input file or from STDIN (through a pipe)
Example: nmap -sV 10.0.0.0/24 | python nmap-query.py -q
[-h | --help]: Will print the help/usage message
[-p | --ports] PORTS: specify one or more (open) ports to filter on. The following input formats are accepted:
Single port number: -p 22
Set of port numbers: -p 22,80,443
[-a | --ip-addrs] IPS: specify one or more IP addresses on which to filter. The following input formats are accepted:
Single IP: -a 10.0.0.1
Set of IPs: -a 10.0.0.1,10.0.0.2,10.0.0.3
Single CIDR block: -a 10.0.0.0/24
Set of CIDR blocks: -a 10.0.0.0/24,10.0.1.0/24
Range of IPs: -a 10.0.0.1-4
[-os | --operating-system] OS: specify one or more operating systems on which to filter. The following input formats are accepted:
Single operating system: -os Windws
Set of operating systems: -os Windows,Linux
[-d | --device-type] DEVICE_TYPE: specify one or more device types on which to filter. The following input formats are accepted:
Single device type: -d router
Set of device types: -d router,switch
[-c | --output-csv]: use CSV as the output format
[-i | --input-file] NMAP_SCAN_RESULTS_FILE: specify the name of the input file (i.e. the file which contains the results of the Nmap scan)
[-o | --output-file] OUTPUT_FILENAME: specify the name of the output file
[-q | --query-mode]: enter the interactive query mode
```
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
nmap_query_tool-0.0.1.tar.gz
(8.7 kB
view hashes)
Built Distributions
Close
Hashes for nmap_query_tool-0.0.1-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 719a3e6e59a5656d088a9c8d29c824dbf9c8e583b2e8f08e4326d0954f45a18c |
|
MD5 | c6a19e2b6634bd3ffc312c86455e2f2c |
|
BLAKE2b-256 | 5dc74b7d0c0163e486c1e6d6e8ec9d9520c769e78be11d802fd9dd85f2f414f6 |
Close
Hashes for nmap_query_tool-0.0.1-py2-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 03a3db6875337450a5dc59a35e8dfac0f5cd493337470107c3ccb7df28e3a9a6 |
|
MD5 | f9c311357b16f77eff7b3ea47b40b6c6 |
|
BLAKE2b-256 | c8613bcceff87177383bb4cd9d03cc5fb012d618e3192371cda47b820f7ce8f0 |