SMap
From SecurityTools
Description
SMap is a drop-in replacement for NMap which uses the same command line options and generates the same style output as NMap. The difference is SMap uses Shodan's free scanning API to gather its data, which means no actual contact with the target system(s) occurs. Since SMap uses the same command line options, you can use variable scanning speeds and host operating system (OS) detection just like you can with NMap. Additionally, only the command line flags -p, -h, -o*, and -iL are actually recognized and used. All other flags are ignored.
Tool Type
More Information
- The README Usage section for SMap, offering sample scan options
- A list of considerations to think about before using SMap instead of NMap
- A slightly more in-depth guide on getting SMap installed, up, and running on a Linux system
- An NMap cheat sheet which is also mostly applicable to SMap
- A complete list of the 1237 ports SMap scans by default
- A video introduction to SMap