NMAP Guide - An excellent guide to using NMAP, providing detailed descriptions of many of the great nmap uses, features, and configurations.
cc882d7d7c3f0d6ace5a8e309cf0667bf4d8afa0ce7a5784de5fd8b0ec75c211
Nmap wrapper that allows for stealthier scanning routines. Features: creating a host/port table and then randomizing it, scanning each host/port combination in a random sequence, easy creation of decoy addresses, parallel scanning with child process management, consolidation of log files into a nlog-style db or MySQL
de4db57bedd850aa95e7a496ac44fc4bcb695572e422d61bedb054836beeda34
Nmap wrapper that allows for stealthier scanning routines. Features: creating a host/port table and then randomizing it, scanning each host/port combination in a random sequence, easy creation of decoy addresses, parallel scanning with child process management, consolidation of log files into a nlog-style db or MySQL.
e89cdf692810ec03e9802366ab832a64ac33ad9d0f32fa1524ec50f8fabcb44a
Nlog is a set of perl scripts that help you manage your Nmap log files. Included are conversion scripts, a CGI interface, and the documentation to build your own anlaysis applications. The ultimate goal of Nlog is to create a system that provides true database integration for Nmap, with the ability to do automated vulnerability checking, report generation, and graphical output for network status reports. Bugfix release; now completely working, nLog v1.5.2 comes with sample scripts for MySQL integration, statistical anlaysis, and the ability to load a database file remotely via http or ftp.
57cfa236e73a714e9fddca65ee7388f7603405ec986772bcc44d011cb407e355
Nlog is a set of perl scripts that help you manage your Nmap log files. Included are conversion scripts, a CGI interface, and the documentation to build your own anlaysis applications. The ultimate goal of Nlog is to create a system that provides true database integration for Nmap, with the ability to do automated vulnerability checking, report generation, and graphical output for network status reports. Bugfix release; now completely working, nLog v1.5.2 comes with sample scripts for MySQL integration, statistical anlaysis, and the ability to load a database file remotely via http or ftp.
b009cf8d7e0233036a4b3919ba61a9e2aed35e28bb31fd32993b23aa51fb103c
Nlog is a set of perl scripts that help you manage your Nmap log files. Included are conversion scripts, a CGI interface, and the documentation to build your own anlaysis applications. The ultimate goal of Nlog is to create a system that provides true database integration for Nmap, with the ability to do automated vulnerability checking, report generation, and graphical output for network status reports.
c374baadffc4ab49c7aab7ad4d577f6474d0d3551165f42251e38fa4b8810cf7
nmap v2.05 - The Network Mapper - nmap is a utility for port scanning large networks, although it works fine for single hosts. General features include: Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses packet filters), UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, and output to machine parseable or human readable log files. This latest release features: Over 25% more OS fingerprints, Nmap now comes with its own nmap-services, Increased the maximum number of OS guesses nmap will make, Random number generation now takes advantage of the /dev/urandom or /dev/random, Machine parseable logs are now more machine parseable, nmap-fingerprintinting-article, CHANGELOG file, updated docs, many bugfixes, code optimizations, much more. This is one of the most useful security tools ever created. Your security/network toolbag is incomplete without nmap! Check out the nmap directory for lots of nmap "add-ons" and accessories.
97b6cefb891dee3d039781bb9aeb4b3b46694ac866ac84f6a2e086ff1239f38f
This is a recommended upgrade "quick fix" release. New features include: Added the squid proxy to nmap-services, nmap looks in more places for nmap-os-fingerprints, fixed memory allocation bugs, improved compatibility with larger variety of platforms. 315k.
576b795bc90d8a83d416003f2da99959eb2d43cfc054e38ae71703396e63686d
his is a platform portability improvement release.
e701b01ba34ff042024eaaf0aae54a933196fa9b079422b40c391c3a6d034c92
bugfix release
0504557626530ed1f4c5ef872578eb4fe5131fa30e058623e88006450e11cdab
nmap.tcl is an eggdrop bot script that facilitates portscanning other IRC users.
53e1e4f40796ad46581375c9992a8fddc895f333a4fb3163600a2f9baaeebe08
nmapstub-1.c (shell version) - This file reads in nmap (v2.x human) output, puts it into port and host structures, and then can call whatever routines you want (per host) to check for exploits, etc.
603ab0e39a01c904c74c243d13e5e1dd5507840d7175b8eefb46022e7fe3ff30
nmapstub.pl (Perl version) - This file reads in nmap (v2.x human) output, puts it into port and host structures, and then can call whatever routines you want (per host) to check for exploits, etc.
9eec95df46627f3dd083c753b015c8efe211bd6294035d83d4a1d8e1e06fc21b
Latest release on rfp's perl-based nmap stub. This program reads in nmap output and parses it into easy to use structures that you can use in your code.
778f5df29eb9440ab9cf1fdc25aa0f4d944509189388f05e04b7d2b96d12e843
Excellent Tcl/Tk/wish-based front end for the nmap network mapper/scanner.
51c69529eabb2cda3c83c81083a9b05ffe8b275e08e996cf98f6ea546033948a
NLog v1.1b - NLog is a set of PERL scripts for managing and analyzing your nmap 2.0 log files. It allows you to keep all of your scan logs in a single searchable database. Very useful for daily network security auditing/monitoring.
e8c8a32d3563da4691b0dbdc637d1808b41c4fc606115063e8ab2b3ab8a61dd1
No information is available for this file.
bcb05bb063ba05a9e3e6004474de5beee6116bf94819ca480b730b4441153419
No information is available for this file.
e1d1841adbf6adce7bc1f57af1b7ca4b2a4282154e41e26642084cf71b9a113a
No information is available for this file.
b9593bfee366635724d7c78422518255f3697a159438a81865217e0d8886913a
No information is available for this file.
928ae6599bdf50ed4d01560bca394fd722f02611373724967ee310ffc7ea531d
dnsscanner
a8f0d3365716182536de27b36b164c1685866cdc525dcfc9d5b03683d2e2de38
exploit.dat
57e5fbf6ca32ad081d91cfc6767c1ee1377f30ee8605c283ec914b50cbdab509
ftpgatescan
b42e1125fffe7ca1b922a6243f9202480fc20cad7da959bcbd68cc5377bf6189
ftpscan
fb228135d7709c47f23a82872ae55a1ed01ad4726a5ddcbf513531810fadbaa8
global_structures.h.diff
b6c94b86a7f66af8a5da1c90e389778799c203fb566c8d05c8a69a4878777cb3