An advanced Nmap automation script featuring NSE fuzzy search (fzf), NSE debugging, Telegram notifications, full-port scans, OS detection, and an interactive menu designed for ethical hackers and penetration testers.
- Interactive menu-based Nmap scanning
- Ping, Quick, Full-Port, OS detection & Aggressive scans
- NSE Script Pattern Matching & Multiple Script Execution
- NSE Debug Mode (deep script trace + logs)
- FZF fuzzy search for NSE scripts
- Automatic intrusion keyword warnings (safe mode)
- Telegram notifications for scan completion
- Automatic output saving (.nmap, .xml, .gnmap)
- Clean error handling and safe execution
- Supports non-interactive automation modes
This project is licensed under the MIT License.r on GitHub!
git clone https://github.com/YOUR-USERNAME/advanced-nmap-cli.git
cd advanced-nmap-cli
chmod +x nmap-cli.sh
sudo ./nmap-cli.sh --install
nmap-cli
- Create a bot using @BotFather
- Save your BOT_TOKEN
- Get your Chat ID using @getidbot
- Export variables:
echo 'export TELEGRAM_BOT_TOKEN="YOUR_TOKEN"' >> ~/.bashrc
echo 'export TELEGRAM_CHAT_ID="YOUR_CHAT_ID"' >> ~/.bashrc
Menu includes:
- Ping Scan
- Quick Scan
- Full Port Scan
- Service & Version Detection
- OS Detection
- Aggressive Scan
- Specific Port Scan
- NSE Pattern Scan
- NSE Debug
- NSE Fuzzy Search (fzf)
./nmap-cli.sh -n -t 192.168.1.1 -m quick
./nmap-cli.sh -n -t scanme.nmap.org -m full
./nmap-cli.sh -n -t 192.168.1.10 -m nse -a "http*" -p 80,443
Fuzzy search NSE scripts:
./nmap-cli.sh
Select option 11 → NSE Fuzzy Search
Features:
- Multi-select script picker
- Automatic detection of intrusive scripts
- Saves results automatically
Output saved in:
./scans/nse_search/
./nmap-cli.sh --debug <target> <script-name>
Produces:
- Simple NSE execution
- Script trace
- Debug logs
- Output files
All scans are saved to:
./scans/
Formats:
- .nmap
- .xml
- .gnmap
- Debug trace logs
Samir Ahamad Khan
Ethical Hacker • Security Researcher • Developer
Specialized in:
- Network security
- Nmap automation
- Bash scripting
- Penetration testing
GitHub:
https://github.com/SamHacker2
Use this tool only on systems you own or have explicit written permission to test.
Unauthorized scanning is illegal.
The author is not responsible for misuse of this tool.
This project is licensed under the MIT License.