SkillAgentSearch skills...

AwesomeNmap

A curated knowledge base of Nmap NSE scripts, CVE intelligence tools, and automated reconnaissance pipelines for security professionals.

Install / Use

/learn @0xBugatti/AwesomeNmap

README

<div align="center"> <img src="https://raw.githubusercontent.com/0xBugatti/AesomeNmap/refs/heads/main/.github/logo-light.svg" width="420" alt="Awesomenmap"> <br>

A Curated Knowledge Base for Nmap Scripts, CVE Intelligence & Automated Reconnaissance Pipelines

Nmap NSE License Platform GitHub stars

<br>

<a href="https://nmap.org/"><img src="https://nmap.org/images/sitelogo-nmap.svg" width="40" alt="Nmap" title="Nmap" /></a>   <a href="https://www.lua.org/"><img src="https://cdn.simpleicons.org/lua/2C2D72" width="40" alt="Lua" title="Lua (NSE Scripts)" /></a>   <a href="https://www.python.org/"><img src="https://cdn.simpleicons.org/python/3776AB" width="40" alt="Python" title="Python" /></a>   <a href="https://www.docker.com/"><img src="https://cdn.simpleicons.org/docker/2496ED" width="40" alt="Docker" title="Docker" /></a>   <a href="https://grafana.com/"><img src="https://cdn.simpleicons.org/grafana/F46800" width="40" alt="Grafana" title="Grafana Dashboard" /></a>   <a href="https://graphviz.org/"><img src="https://img.shields.io/badge/Graphviz-DOT-E10098?style=flat&logo=data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHZpZXdCb3g9IjAgMCAyNCAyNCI+PGNpcmNsZSBjeD0iNiIgY3k9IjYiIHI9IjIiIGZpbGw9IiNmZmYiLz48Y2lyY2xlIGN4PSIxOCIgY3k9IjYiIHI9IjIiIGZpbGw9IiNmZmYiLz48Y2lyY2xlIGN4PSIxMiIgY3k9IjE4IiByPSIyIiBmaWxsPSIjZmZmIi8+PGxpbmUgeDE9IjYiIHkxPSI4IiB4Mj0iMTIiIHkyPSIxNiIgc3Ryb2tlPSIjZmZmIiBzdHJva2Utd2lkdGg9IjEuNSIvPjxsaW5lIHgxPSIxOCIgeTE9IjgiIHgyPSIxMiIgeTI9IjE2IiBzdHJva2U9IiNmZmYiIHN0cm9rZS13aWR0aD0iMS41Ii8+PC9zdmc+" height="28" alt="Graphviz" title="Graphviz Topology" /></a>   <a href="https://www.sqlite.org/"><img src="https://cdn.simpleicons.org/sqlite/003B57" width="40" alt="SQLite" title="SQLite" /></a>   <a href="https://telegram.org/"><img src="https://cdn.simpleicons.org/telegram/26A5E4" width="40" alt="Telegram" title="Telegram Alerts" /></a>   <a href="https://www.linux.org/"><img src="https://cdn.simpleicons.org/linux/FCC624" width="40" alt="Linux" title="Linux" /></a>   <a href="https://www.gnu.org/software/bash/"><img src="https://cdn.simpleicons.org/gnubash/4EAA25" width="40" alt="Bash" title="Bash" /></a>

A living reference of essential Nmap extensions, vulnerability feeds, and reporting tooling — maintained for security analysts, pentesters, and blue teams.

</div>

📑 Table of Contents


🎯 Overview

Awesomenmap is a knowledge-base repository that centralizes the most valuable Nmap NSE scripts, CVE search utilities, and post-scan reporting pipelines into a single, well-organized reference. Instead of hunting across dozens of GitHub repositories and forum posts, security practitioners can use this project as a definitive index and automation hub for all things Nmap.

The repository is intentionally kept lightweight — structured README files, shared resources, and upstream references. Third-party scripts are pulled from their original sources and kept up to date through a simple sync process.

| Capability | Description | |---|---| | Script Management | Pull and update the latest vulnerability, default-account, and version-detection NSE scripts from trusted upstream sources | | CVE Intelligence | Search known CVEs and exploits directly from the command line without leaving your terminal | | Automated Scanning | A dashboard-driven workflow assigns scanning targets, executes Nmap with the curated script set, and produces structured output | | Rich Reporting | Generate HTML scan reports and Graphviz-compatible network topology graphs for every completed scan | | Real-time Alerts | Push critical findings to a Telegram bot for instant visibility |


📂 Repository Structure

Awesomenmap/
│
├── README.md
├── LICENSE
├── .gitignore
│
├── scripts/
│   ├── nse/                           # Curated NSE scripts
│   │   ├── vulners.nse                # Vulners.com vulnerability detection
│   │   ├── nndefaccts.nse             # Default account credential checker
│   │   ├── vicarius-nmap/             # Vicarius CVE mapping scripts
│   │   ├── vulscan/                   # Vulscan alternative engine
│   │   ├── log4shell_nse.nse          # Log4Shell (CVE-2021-44228) detector
│   │   ├── ms-exchange-version.nse    # MS Exchange version enumeration
│   │   └── gitlab-version.nse         # GitLab version enumeration
│   │
│   └── cli/                           # CVE & exploit search tools
│       ├── getsploit/                 # Vulners.com exploit downloader
│       └── search_vulns/              # Multi-source CVE searcher
│
└── visualize/
    ├── nmap-dashboard.xsl             # XSLT stylesheet for HTML reports
    └── nmap-formatter/                # Graphviz network topology generator

🔧 Core NSE Script Updates

These scripts form the backbone of the vulnerability detection workflow. Keep them up to date by pulling from their official upstream repositories.

1. Vulners — Vulnerability Detection

Source: vulnersCom/nmap-vulners

Queries the Vulners.com API to match detected service versions against a comprehensive vulnerability database. Returns associated CVEs, CVSS scores, and available exploit references in real time.

cd scripts/nse/
git clone https://github.com/vulnersCom/nmap-vulners.git
cp nmap-vulners/vulners.nse ./
nmap -sV --script vulners.nse --script-args vulnersdebug=1 <target>

2. Default Accounts — Credential Auditing

Source: nnposter/nndefaccts

Checks network services for default or well-known credentials using an extensive, regularly updated dictionary of default username/password pairs. Covers routers, cameras, IoT devices, industrial controllers, and enterprise software — invaluable during initial reconnaissance to identify services using factory-default authentication.

cd scripts/nse/
git clone https://github.com/nnposter/nndefaccts.git
cp nndefaccts/nndefaccts.nse ./
nmap -p 22,23,80,443,8080 --script nndefaccts.nse <target>

3. Vicarius Nmap — CVE Mapping

Source: VicariusInc/vicarius-nmap

An alternative CVE mapping engine that cross-references detected software versions against the Vicarius vulnerability database. Complements the Vulners script by offering a second opinion on CVE coverage and surfacing discrepancies. Particularly strong for detecting known vulnerabilities in less common or niche software packages that may not receive immediate coverage in larger databases.

cd scripts/nse/
git clone https://github.com/VicariusInc/vicarius-nmap.git
cp -r vicarius-nmap/scripts/* ./
nmap -sV --script vicarius-cve <target>

🔄 Alternative: Vulscan Integration

Source: scipag/vulscan

A self-contained, offline-capable alternative to the API-dependent Vulners script. Ships with local vulnerability databases and can be extended with custom CSV/JSON feeds. Performs version-string matching against its bundled databases, making it ideal for air-gapped environments or scans where internet access during execution is restricted or undesirable.

cd scripts/nse/
git clone https://github.com/scipag/vulscan.git
nmap -sV --script=vulscan/vulscan.nse <target>

Tip: Use Vulners and Vulscan together for maximum coverage — Vulscan as the offline baseline and Vulners for real-time API enrichment.


📦 NSE Script Collections

Community-maintained collections that expand Nmap's detection capabilities beyond the official script library. Each has been vetted for quality and relevance — periodically pull the latest versions to stay current.

| Collection | Source | Focus | |---|---|---| | nmap-extra-nse | sighook/nmap-extra-nse | General-purpose auxiliary scripts not yet merged into the official Nmap distribution — custom service probes, brute-force modules, and recon helpers | | NSE_scripts | icarot/NSE_scripts | Vulnerability detection and information-gathering scripts tailored for web application auditing and service enumeration | | Custom-Nse | ibrahmsql/Custom-Nse | Individually crafted NSE scripts targeting specific vulnerabilities, unusual protocols, and emerging threat landscapes | | log4shell_nse | righel/log4shell_nse | Dedicated Log4Shell (CVE-2021-44228) detector for Java-based services — performs both header-based and DNS-based verification | | ms-exchange-version | righel/ms-exchange-version-nse | Precise Microsoft Exchange Server version fingerprinting — essential for assessing Patch

Related Skills

View on GitHub
GitHub Stars8
CategoryDevelopment
Updated5d ago
Forks3

Languages

Lua

Security Score

75/100

Audited on Apr 6, 2026

No findings