Skip to main content

A tool that automates Nmap scans and saves results to a file.

Project description

RedSocket v3.0

RedSocket is an interactive command-line wrapper for Nmap and Masscan designed to simplify and accelerate real-world network reconnaissance.

It provides preconfigured scan profiles, automatic result management, and a clean menu-driven interface for fast and reliable scanning without memorizing complex command-line flags.

Logo


Why RedSocket?

While Nmap is extremely powerful, using it efficiently during live engagements or labs can be slow and error-prone. RedSocket focuses on speed, clarity, and usability.

It provides:

  • Prebuilt scan profiles for common reconnaissance scenarios
  • Automatic result saving with timestamps
  • Real-time highlighting of critical services (SSH, RDP, FTP, etc.)
  • Session logging for reproducibility
  • Optional high-speed scanning using Masscan

RedSocket is designed for:

  • Penetration testers
  • CTF players
  • Cybersecurity students
  • Lab and practice environments

Features

Scan Profiles

RedSocket includes multiple predefined scanning modes:

  • Quick TCP Scan – Fast scan of common ports with service detection

  • Full TCP Scan – Complete 1-65535 port scan

  • UDP Scan – Scan of top UDP ports

  • Vulnerability Scan – Uses Nmap NSE vulnerability scripts

  • Masscan Scan – High-speed full-range scanning with automatic sudo detection

  • User Interface

User Interface


Custom Command Mode

Advanced users can execute raw Nmap commands while still benefiting from:

  • Automatic logging
  • Optional result saving
  • Live terminal output

Critical Service Detection

During scans, RedSocket highlights sensitive or high-value services:

Example:

[!] CRITICAL SERVICE → SSH (22)
[!] CRITICAL SERVICE → RDP (3389)

This allows faster decision-making during reconnaissance phases.


Automatic Result Saving

After each scan, users can choose:

  • Save results in normal format (-oN)
  • Save results in all formats (-oA)
  • Skip saving

Files are automatically stored on the Desktop with timestamped filenames.

Interface Choice -oA -oN

input save Interface


Session Logging

All executed commands are stored in:

redsocket_session.log

This enables:

  • Scan reproducibility
  • Audit trails
  • Strategy debugging

Auto-Update System

RedSocket can check for new versions directly from GitHub and update itself when a newer release is available.


Requirements

  • Python 3.8+
  • Nmap installed and available in PATH
  • Masscan (optional but recommended)

Install dependencies on Debian-based systems:

sudo apt install nmap masscan

Installation

Clone the repository:

git clone https://github.com/phantomsecuritydev-ctrl/RedSocket.git
cd RedSocket
python3 redsocket.py

Example Usage

python3 redsocket.py

Select a scan profile from the menu and provide a target:

1
192.168.1.10

Example output:

[+] Running: nmap -F -sV 192.168.1.10
[!] CRITICAL SERVICE → SSH (22)
[✔] Scan completed

Results will be saved to the Desktop if enabled.

Fast Scan Example

Fast Scan


Project Goals

RedSocket is not intended to replace Nmap. Its goal is to make Nmap faster and easier to use in environments where:

  • time is limited
  • command syntax is easy to mistype
  • scan results must be archived automatically

Legal Notice

RedSocket does not include or redistribute Nmap or Masscan. It acts solely as a wrapper that executes these tools via system commands.

This project is not affiliated with or endorsed by the Nmap Project.

Nmap is licensed separately under its own license: https://nmap.org/book/man-legal.html


License

This project is licensed under the GNU General Public License v3.0.


Disclaimer

This tool is intended for educational purposes and authorized security testing only.

Unauthorized network scanning may be illegal in your jurisdiction. The author assumes no responsibility for misuse or damage caused by this software.


Author

Daniel Di Blasi (Phantom)

GitHub: https://github.com/phantomsecuritydev-ctrl/RedSocket

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

redsocket-3.0.0.tar.gz (15.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

redsocket-3.0.0-py3-none-any.whl (15.8 kB view details)

Uploaded Python 3

File details

Details for the file redsocket-3.0.0.tar.gz.

File metadata

  • Download URL: redsocket-3.0.0.tar.gz
  • Upload date:
  • Size: 15.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.9

File hashes

Hashes for redsocket-3.0.0.tar.gz
Algorithm Hash digest
SHA256 e4fba78c5ac503a18a69bd8465d99c1981801e2e5965ffbca8399951df79a477
MD5 cceaf09fb67e3d2cdb401d7a9a089ed7
BLAKE2b-256 f85540a3544b8c1d66871121ca386d73fb20a07d5d0f6baa144193d099240508

See more details on using hashes here.

File details

Details for the file redsocket-3.0.0-py3-none-any.whl.

File metadata

  • Download URL: redsocket-3.0.0-py3-none-any.whl
  • Upload date:
  • Size: 15.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.9

File hashes

Hashes for redsocket-3.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 e8984abf2aa917ff0a37677ca8cc4d38fa6d33e56a8c6528ff860d96f5e2aaa6
MD5 7c18c1387bed41c66dc74a817e75d650
BLAKE2b-256 ce70d8cdda3f5318ba3addee1af79cb389969c49c81597234601d1a9349f1dda

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page