A streamlined CLI-based interactive menu that simplifies the process of running and managing complex Nmap network scans.
Manually typing long Nmap flags can be error-prone and time-consuming. This interactive menu categorizes scans into logical groups—like fast discovery, deep service detection, or vuln-scanning—so you can launch professional audits with a single keystroke.
--- JUTT CYBER TECH NMAP MENU ---
[1] Quick Scan (OS Detection & Versioning)
[INIT] Nmap Launcher Engine 2.1 Starting...
[INFO] Target: 192.168.1.0/24 (Subnet Discovery)
[SCAN] Profile: Stealth/Service_Audit (-sS -sV -T4)
[WAIT] Scanning 254 hosts...
[FOUND] 192.168.1.45 (Linux 5.4.0) - Ports: 22, 80, 443
[NSE] Running vuln-scripts against 80, 443...
[SUCCESS] Exporting interactive dashboard: summary.html
Sequence multiple scan types (UDP then TCP) automatically, aggregating results into a single view.
Convert complex Nmap flags into simple, memorable aliases for high-pressure engagement environments.
Auto-generate interactive HTML dashboards directly from raw Nmap XML data for stakeholder review.
Automatically adjusts scan speeds (T0-T5) based on network congestion and IDS presence to minimize detection risk.
Context-aware script selection. If an SSH port is found, it automatically queues brute-force and vulnerability scripts for SSH.
Intercepts raw stdout from Nmap subprocesses to provide a rich TUI (Terminal User Interface) with filtering capabilities.
| Scanning Engine | Nmap 7.9+ (External Dependency) |
| Wrapper Language | Python 3.9 / Go Hybrid |
| Output Support | XML, JSON, HTML5, Grepable |
| Targeting | IPv4, IPv6, Hostnames, Subnets |
| Compatibility | Ubuntu, Debian, Kali, CentOS, Alpine |
Define single IPs or CIDR blocks and choose a scanning profile.
Execute low-level discovery (ICMP/ARP) to identify active hosts on the wire.
Run service identification and NSE scripts to find potential vulnerabilities.
Aggregate data into a searchable interactive dashboard for remediation.