Metadata-Version: 2.1
Name: pnmap
Version: 0.1.1
Summary: A simplified Python implementation of nmap
Home-page: https://github.com/veyga/pnmap
License: MIT
Keywords: network,scan,nmap
Author: Andrew Stefanich
Author-email: andrewstefanich@gmail.com
Requires-Python: >=3.8,<4.0
Classifier: Environment :: Console
Classifier: License :: OSI Approved :: MIT License
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.8
Requires-Dist: click (>=7.1.2,<8.0.0)
Requires-Dist: scapy (>=2.4.3,<3.0.0)
Project-URL: Repository, https://github.com/veyga/pnmap
Description-Content-Type: text/markdown

# pnmap
A simplified Python implementation of nmap (network mapper/port scanner).

<img src="img/snake_eye.jpg" alt="pnmap">

## Features

- Quick and easy multi-target subnet scans.
- Single target external scans.
- UDP and TCP scans.
- Often [faster](benchmarks.pdf) than nmap for simple scans, due to program simplicity.

## Installation
``` pip3 install pnmap ```

## Usage
- For quick subnet scans:
```sudo pnmap```
- For additional configuration, utilize help menu:
``` pnmap --help ```

- See [outputs](https://github.com/veyga/pnmap/tree/master/output) for specific use cases.

## Additional Information
- As pnmap utilizes packet injection, it must be run as sudo
- Due to network briding, pnmap does not work deterministically inside VM's (e.g. Virtualbox, VMWare)
- Results which return as "closed" implies the port returned a response
- Results which return "filtered" are due to connection issues or are filtered by a firewall.

## Screenshots
<i>Subnet Scan</i></br></br>
![Subet Scan](img/subnet_scan.png)
</br>

<i>Help</i></br></br>
![Help Menu](img/help.png)
</br>

