Nmap Dashboard

A streamlined CLI-based interactive menu that simplifies the process of running and managing complex Nmap network scans.

Streamlined Scanning

Manually typing long Nmap flags can be error-prone and time-consuming. This interactive menu categorizes scans into logical groups—like fast discovery, deep service detection, or vuln-scanning—so you can launch professional audits with a single keystroke.

  • Intelligent profile management for stealth and aggressive scans
  • Real-time output streaming with colorized priority highlighting
  • Integrated Nmap Scripting Engine (NSE) vulnerability library
  • Post-scan data aggregation for multi-target environments
nmap-menu.sh

--- JUTT CYBER TECH NMAP MENU ---

[1] Quick Scan (OS Detection & Versioning)

[INIT] Nmap Launcher Engine 2.1 Starting...

[INFO] Target: 192.168.1.0/24 (Subnet Discovery)

[SCAN] Profile: Stealth/Service_Audit (-sS -sV -T4)

[WAIT] Scanning 254 hosts...

[FOUND] 192.168.1.45 (Linux 5.4.0) - Ports: 22, 80, 443

[NSE] Running vuln-scripts against 80, 443...

[SUCCESS] Exporting interactive dashboard: summary.html

Chain Scans

Sequence multiple scan types (UDP then TCP) automatically, aggregating results into a single view.

Alias Management

Convert complex Nmap flags into simple, memorable aliases for high-pressure engagement environments.

Visual Reporting

Auto-generate interactive HTML dashboards directly from raw Nmap XML data for stakeholder review.

Scan Intelligence Modules

Adaptive Timing Engine

Automatically adjusts scan speeds (T0-T5) based on network congestion and IDS presence to minimize detection risk.

NSE Script Automator

Context-aware script selection. If an SSH port is found, it automatically queues brute-force and vulnerability scripts for SSH.

Live Streamer Core

Intercepts raw stdout from Nmap subprocesses to provide a rich TUI (Terminal User Interface) with filtering capabilities.

Technical Specs

Scanning Engine Nmap 7.9+ (External Dependency)
Wrapper Language Python 3.9 / Go Hybrid
Output Support XML, JSON, HTML5, Grepable
Targeting IPv4, IPv6, Hostnames, Subnets
Compatibility Ubuntu, Debian, Kali, CentOS, Alpine

The Discovery Workflow

01

Targeting

Define single IPs or CIDR blocks and choose a scanning profile.

02

Probing

Execute low-level discovery (ICMP/ARP) to identify active hosts on the wire.

03

Auditing

Run service identification and NSE scripts to find potential vulnerabilities.

04

Synthesize

Aggregate data into a searchable interactive dashboard for remediation.

Start Scanning

Download on GitHub