Skip to content

Sandmap

Nmap on steroids with 31 scan modules

BashGitHub

Description

Sandmap is a CLI wrapper around Nmap that provides 31 predefined scanning modules with 459 scan profiles. It simplifies complex Nmap scans into easy-to-use modules for service detection, vulnerability scanning, brute forcing, and more. Think of it as a menu-driven interface to Nmap's full power.

Installation

BASH
git clone https://github.com/trimstray/sandmap.git
cd sandmap
sudo ./setup.sh install

# Or just run directly
bash sandmap.sh

Basic Usage

BASH
# Launch interactive mode
sandmap

# Quick TCP scan
sandmap -t target.com

# Select module interactively
# Choose from: reconn, portscan, service, vuln, exploit, etc.

Advanced Usage

BASH
# Specific module
sandmap -t target.com -m portscan

# Aggressive service detection
sandmap -t target.com -m service -p aggressive

# Vulnerability scan
sandmap -t target.com -m vuln

# Custom Nmap flags passthrough
sandmap -t target.com -m portscan -p "top1000" -n "-Pn --reason"

Available Modules

  • reconn — Host discovery and OS detection
  • portscan — Port scanning (TCP/UDP, SYN, connect)
  • service — Service and version detection
  • vuln — NSE vulnerability scripts
  • exploit — NSE exploit scripts
  • nse — Custom NSE script runner
  • brute — Brute force attack modules

Common Workflows

BASH
# Full reconnaissance
sandmap -t target.com -m reconn -p default
sandmap -t target.com -m portscan -p top1000
sandmap -t target.com -m service -p default

# Quick vulnerability assessment
sandmap -t target.com -m vuln -p default