Description
Sandmap is a CLI wrapper around Nmap that provides 31 predefined scanning modules with 459 scan profiles. It simplifies complex Nmap scans into easy-to-use modules for service detection, vulnerability scanning, brute forcing, and more. Think of it as a menu-driven interface to Nmap's full power.
Installation
BASH
git clone https://github.com/trimstray/sandmap.git
cd sandmap
sudo ./setup.sh install
# Or just run directly
bash sandmap.sh
Basic Usage
BASH
# Launch interactive mode
sandmap
# Quick TCP scan
sandmap -t target.com
# Select module interactively
# Choose from: reconn, portscan, service, vuln, exploit, etc.
Advanced Usage
BASH
# Specific module
sandmap -t target.com -m portscan
# Aggressive service detection
sandmap -t target.com -m service -p aggressive
# Vulnerability scan
sandmap -t target.com -m vuln
# Custom Nmap flags passthrough
sandmap -t target.com -m portscan -p "top1000" -n "-Pn --reason"
Available Modules
- reconn — Host discovery and OS detection
- portscan — Port scanning (TCP/UDP, SYN, connect)
- service — Service and version detection
- vuln — NSE vulnerability scripts
- exploit — NSE exploit scripts
- nse — Custom NSE script runner
- brute — Brute force attack modules
Common Workflows
BASH
# Full reconnaissance
sandmap -t target.com -m reconn -p default
sandmap -t target.com -m portscan -p top1000
sandmap -t target.com -m service -p default
# Quick vulnerability assessment
sandmap -t target.com -m vuln -p default