A tool that automates Nmap scans and saves results to a file.
Project description
RedSocket v3.0
RedSocket is an interactive command-line wrapper for Nmap and Masscan designed to simplify and accelerate real-world network reconnaissance.
It provides preconfigured scan profiles, automatic result management, and a clean menu-driven interface for fast and reliable scanning without memorizing complex command-line flags.
Why RedSocket?
While Nmap is extremely powerful, using it efficiently during live engagements or labs can be slow and error-prone. RedSocket focuses on speed, clarity, and usability.
It provides:
- Prebuilt scan profiles for common reconnaissance scenarios
- Automatic result saving with timestamps
- Real-time highlighting of critical services (SSH, RDP, FTP, etc.)
- Session logging for reproducibility
- Optional high-speed scanning using Masscan
RedSocket is designed for:
- Penetration testers
- CTF players
- Cybersecurity students
- Lab and practice environments
Features
Scan Profiles
RedSocket includes multiple predefined scanning modes:
-
Quick TCP Scan – Fast scan of common ports with service detection
-
Full TCP Scan – Complete 1-65535 port scan
-
UDP Scan – Scan of top UDP ports
-
Vulnerability Scan – Uses Nmap NSE vulnerability scripts
-
Masscan Scan – High-speed full-range scanning with automatic sudo detection
-
User Interface
Custom Command Mode
Advanced users can execute raw Nmap commands while still benefiting from:
- Automatic logging
- Optional result saving
- Live terminal output
Critical Service Detection
During scans, RedSocket highlights sensitive or high-value services:
Example:
[!] CRITICAL SERVICE → SSH (22)
[!] CRITICAL SERVICE → RDP (3389)
This allows faster decision-making during reconnaissance phases.
Automatic Result Saving
After each scan, users can choose:
- Save results in normal format (
-oN) - Save results in all formats (
-oA) - Skip saving
Files are automatically stored on the Desktop with timestamped filenames.
Interface Choice -oA -oN
Session Logging
All executed commands are stored in:
redsocket_session.log
This enables:
- Scan reproducibility
- Audit trails
- Strategy debugging
Auto-Update System
RedSocket can check for new versions directly from GitHub and update itself when a newer release is available.
Requirements
- Python 3.8+
- Nmap installed and available in PATH
- Masscan (optional but recommended)
Install dependencies on Debian-based systems:
sudo apt install nmap masscan
Installation
Clone the repository:
git clone https://github.com/phantomsecuritydev-ctrl/RedSocket.git
cd RedSocket
python3 redsocket.py
Example Usage
python3 redsocket.py
Select a scan profile from the menu and provide a target:
1
192.168.1.10
Example output:
[+] Running: nmap -F -sV 192.168.1.10
[!] CRITICAL SERVICE → SSH (22)
[✔] Scan completed
Results will be saved to the Desktop if enabled.
Fast Scan Example
Project Goals
RedSocket is not intended to replace Nmap. Its goal is to make Nmap faster and easier to use in environments where:
- time is limited
- command syntax is easy to mistype
- scan results must be archived automatically
Legal Notice
RedSocket does not include or redistribute Nmap or Masscan. It acts solely as a wrapper that executes these tools via system commands.
This project is not affiliated with or endorsed by the Nmap Project.
Nmap is licensed separately under its own license: https://nmap.org/book/man-legal.html
License
This project is licensed under the GNU General Public License v3.0.
Disclaimer
This tool is intended for educational purposes and authorized security testing only.
Unauthorized network scanning may be illegal in your jurisdiction. The author assumes no responsibility for misuse or damage caused by this software.
Author
Daniel Di Blasi (Phantom)
GitHub: https://github.com/phantomsecuritydev-ctrl/RedSocket
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file redsocket-3.0.0.tar.gz.
File metadata
- Download URL: redsocket-3.0.0.tar.gz
- Upload date:
- Size: 15.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e4fba78c5ac503a18a69bd8465d99c1981801e2e5965ffbca8399951df79a477
|
|
| MD5 |
cceaf09fb67e3d2cdb401d7a9a089ed7
|
|
| BLAKE2b-256 |
f85540a3544b8c1d66871121ca386d73fb20a07d5d0f6baa144193d099240508
|
File details
Details for the file redsocket-3.0.0-py3-none-any.whl.
File metadata
- Download URL: redsocket-3.0.0-py3-none-any.whl
- Upload date:
- Size: 15.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e8984abf2aa917ff0a37677ca8cc4d38fa6d33e56a8c6528ff860d96f5e2aaa6
|
|
| MD5 |
7c18c1387bed41c66dc74a817e75d650
|
|
| BLAKE2b-256 |
ce70d8cdda3f5318ba3addee1af79cb389969c49c81597234601d1a9349f1dda
|