cybersecsi / ews-nmap

Extract web servers from an Nmap XML file

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool


ews-nmap

ews-nmap

Extract Web Servers from Nmap

Table of Contents

Overview

ews-nmap (Extract Web Servers from Nmap) is a simple script that allows you to easily find all web servers from the XML output of Nmap. The script performs a simple scraping of the informations in the XML file and identifies HTTP/S services.

Getting Started

Run nmap and save XML output, for example:

nmap -sV -oX <nmap_output.xml>  

Example

The output of the tool is like the following: Execution example

Install & Run

To install it you just need to run:

pip install ews-nmap

Run without installing

Prerequisites

Install dependencies by using the following command:

pip install -r requirements.txt
chmod +x ewsnmap/ewsnmap.py
Usage: ewsnmap.py NMAP_XML_FILE <flags>
  optional flags:        --output-dir | --output
  

To run the parser:

ewsnmap.py <nmap_output.xml>   

the script will generate a file output.txt in ewsnmap-output dir. If you want to set the output file and the output dir:

ewsnmap.py <nmap_output.xml>  --output <output_csv_file> --dir <output_directory>

Contributing

Contributions are what make the open source community such an amazing place to be learn, inspire, and create. Any contributions you make are greatly appreciated.

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

Credits

ews-nmap is proudly developed @SecSI by:

License

Distributed under Apache 2 License. See LICENSE for more information.

About

Extract web servers from an Nmap XML file

License:Apache License 2.0


Languages

Language:Python 100.0%