nettacker
all
Automate information gathering, vulnerability scanning and eventually generate a report.
More info →Options (4)
-m, --modulesbooleanRun a port scan on targets
Example:
nettacker {{[-m|--modules]}} port_scan {{[-i|--targets]}} {{192.168.0.1/24,owasp.org,scanme.org,...}}-i, --targetsbooleanRun a port scan on targets
Example:
nettacker {{[-m|--modules]}} port_scan {{[-i|--targets]}} {{192.168.0.1/24,owasp.org,scanme.org,...}}-g, --portsbooleanRun a port scan on specific ports and targets listed in a file (newline separated)
Example:
nettacker {{[-m|--modules]}} port_scan {{[-g|--ports]}} {{22,80,443,...}} {{[-l|--targets-list]}} {{path/to/targets.txt}}-l, --targets-listbooleanRun a port scan on specific ports and targets listed in a file (newline separated)
Example:
nettacker {{[-m|--modules]}} port_scan {{[-g|--ports]}} {{22,80,443,...}} {{[-l|--targets-list]}} {{path/to/targets.txt}}Examples (4)
List all available modules
nettacker --show-all-modulesRun a port scan on targets
nettacker [-m|--modules] port_scan [-i|--targets] 192.168.0.1/24,owasp.org,scanme.org,...Run a port scan on specific ports and targets listed in a file (newline separated)
nettacker [-m|--modules] port_scan [-g|--ports] 22,80,443,... [-l|--targets-list] path/to/targets.txtRun ping test before scan and then run multiple scan types on target
nettacker --ping-before-scan [-m|--modules] port_scan,subdomain_scan,waf_scan,... [-g|--ports] 80,443 [-i|--targets] owasp.orgmade by @shridhargupta | data from tldr-pages