SMap: Difference between revisions

From SecurityTools
(Created SMap Description page and setup More Information links.)
 
(Expand on tool functionality/description, add more "More Information")
Line 1: Line 1:
=== Description ===
=== Description ===


[https://github.com/0xSojalSec/Smap-shodan SMap] is a drop-in replacement for [[NMap]] which uses the same command line options and generates the same style output as NMap. The difference is SMap uses [https://www.shodan.io Shodan's] free scanning API to gather its data. Since SMap uses the same command line options, you can use variable scanning speeds and host operating system (OS) detection just like you can with NMap.
[https://github.com/0xSojalSec/Smap-shodan SMap] is a drop-in replacement for [[NMap]] which uses the same command line options and generates the same style output as NMap. The difference is SMap uses [https://www.shodan.io Shodan's] free scanning API to gather its data, which means no actual contact with the target system(s) occurs. Since SMap uses the same command line options, you can use variable scanning speeds and host operating system (OS) detection just like you can with NMap. Additionally, only the command line flags -p, -h, -o*, and -iL are actually recognized and used. All other flags are ignored.


=== Tool Type ===
=== Tool Type ===
Line 9: Line 9:
=== More Information ===
=== More Information ===


* The [https://github.com/0xSojalSec/Smap-shodan/blob/main/README.md README] for the project, offering sample scan options and a list of considerations to think about before using SMap instead of NMap
* The [https://github.com/0xSojalSec/Smap-shodan/blob/main/README.md README Usage section] for SMap, offering sample scan options
* A [https://github.com/0xSojalSec/Smap-shodan#usage list of considerations] to think about before using SMap instead of NMap
* A slightly [https://a-arich.com/ficavawu/smap-a-drop-in-replacement-for-nmap-powered-by-shodan-io/?ref=rp more in-depth guide] on getting SMap installed, up, and running on a Linux system
* A slightly [https://a-arich.com/ficavawu/smap-a-drop-in-replacement-for-nmap-powered-by-shodan-io/?ref=rp more in-depth guide] on getting SMap installed, up, and running on a Linux system
* An [https://allabouttesting.org/nmap-cheat-sheet/ NMap cheat sheet] which is also applicable to SMap
* An [https://allabouttesting.org/nmap-cheat-sheet/ NMap cheat sheet] which is also mostly applicable to SMap
* A complete list of [https://api.shodan.io/shodan/ports the 1237 ports SMap scans] by default
* A video [https://www.youtube.com/watch?v=PYVml5MF44A&pp=ygULc2hvZGFuIHNtYXA%3D introduction to SMap]


=== Similar Tools ===
=== Similar Tools ===

Revision as of 18:37, 27 September 2023

Description

SMap is a drop-in replacement for NMap which uses the same command line options and generates the same style output as NMap. The difference is SMap uses Shodan's free scanning API to gather its data, which means no actual contact with the target system(s) occurs. Since SMap uses the same command line options, you can use variable scanning speeds and host operating system (OS) detection just like you can with NMap. Additionally, only the command line flags -p, -h, -o*, and -iL are actually recognized and used. All other flags are ignored.

Tool Type

More Information

Similar Tools