๐ง A terminal-based, fully interactive menu to build and run complex
nmapscans with ease, including nse scripts too.
- Set multiple targets โ IPs, ranges, hostnames, CIDR
- Toggle multiple scan types (
-sS,-sV,-O,-sn, etc.) - Control timing templates from Paranoid to Insane (
-T0to-T5) - Flag toggles for
-6,-n,-r,--reason, and more - Host discovery flags:
PE,PP,PM,PS, etc. - NSE scripting:
- Select from all installed scripts (300+!)
- Add by category:
vuln,auth,fuzzer, etc. - Pass custom arguments
- Output options: Save as Normal, XML, Grepable, or all at once
- Live preview of final
nmapcommand - Friendly terminal UI designed to speed up Nmap usage for all skill levels with easy methods
git clone https://github.com/ARCANGEL0/EzyMap
cd EzyMap
chmod +x install.sh
./install.sh| Option # | Menu | What It Does |
|---|---|---|
| 1 | Set Targets | IPs, CIDR blocks, hostnames |
| 2 | Scan Types | Toggle multiple scans (-sS, -sV, etc.) |
| 3 | Ports & Ranges | Choose TCP/UDP ranges or combo (T:1-100,U:53) |
| 4 | Timing | Set scan speed using -T flags |
| 5 | Host Discovery | ICMP, TCP, and UDP pings |
| 6 | Toggle Flags | IPv6, no DNS, show reason, etc. |
| 7 | NSE Scripting | Select by category or script, with args |
| 8 | Output Options | Choose output formats or plain |
| 9 | Review & Run | Shows final command and runs it |
Toggle and combine multiple scan modes:
- SYN scan (
-sS) - Service detection (
-sV) - OS detection (
-O) - Ping scan (
-sn) - TCP connect (
-sT) - UDP scan (
-sU) - Aggressive scan (
-A) - Custom combinations
- TCP and UDP ports
- Ranges and lists
- Combined syntax:
T:1-100,U:53,67,123
- Full control over timing templates:
-T0(Paranoid)-T1(Sneaky)-T2(Polite)-T3(Normal)-T4(Aggressive)-T5(Insane)
Enable or disable discovery methods:
- ICMP echo, timestamp, netmask
- TCP SYN / ACK ping
- UDP ping
- ARP discovery (LAN)
Quick enable/disable for:
- IPv6 (
-6) - No DNS resolution (
-n) - Sequential port scan (
-r) - Show scan reasons (
--reason) - Disable host discovery (
-Pn) - Verbosity and debug levels
EzyMap provides full access to installed NSE scripts, by actively searching in default nmap directory.
- List and select from all local NSE scripts (300+ depending on install)
- Filter by category:
vulnauthdiscoveryexploitmalwarefuzzerdefaultsafe
- Combine multiple scripts in one scan
- Use
-T4or-T5for aggressive speed. - Use with
-sSand-T0/-T1for a stealthier approach. - Toggle
-6to provide a valid IPv6 target.
This tool is intended solely for educational purposes and authorized testing. Scanning without permission is both illegal and unethical.
Always make sure you have explicit authorization before testing any network or system. I am not liable for any damages or issues caused by the use of this tool.
