nmap2md
nmap2md copied to clipboard
A little utility to convert nmap xml results to markdown tables
nmap2md
A little utility to convert nmap XML results to markdown tables.
Usage
Download application, you can use git for it:
git clone [email protected]:vdjagilev/nmap2md.git
cd nmap2md
Example which parses nmap XML and outputs Markdown tables
./nmap2md.py test.xml
Options
Columns and row cells definition should be divided by ,.
-cis used to define columns. It is possible to write there anything- Default:
Port,State,Service,Version
- Default:
--rcis used to define row cells- Default:
[port.number]/[port.protocol],[state],[service.name],[service.product] [service.version] - Available options:
[port.number]Port number (80)[port.protocol]Port protocol (TCP)[state]State (open)[service.name]Name of the used service (http)[service.product]Type of product used on that service (Apache httpd)[service.version]Version of the product (2.2.14)
- Default:
--hsis header size. Size variations: from 1 to 6.- Default: 0 (disabled)
--sortis for sorting.- Default:
Port;asc - Can use any column that is defined in
-c asc&descoptions, if none is provided:ascby default
- Default:
--print-emptysome port scanning results are empty and those are not displayed. However if there is a need to print empty sets, this option allows this.- Default: False
Output example
An example with many options and MD support in table cells (service values are italic). XML file was taken from https://nmap.org/book/output-formats-xml-output.html and this command was used:
./nmap2md.py test.xml -c "Port,State,Service,Version" --hs 4 --rc "[port.number]/[port.protocol],[state],*[service.name]*,[service.product] [service.version]"
74.207.244.221
| Port | State | Service | Version |
|---|---|---|---|
| 22/tcp | open | ssh | OpenSSH 5.3p1 Debian 3ubuntu7 |
| 80/tcp | open | http | Apache httpd 2.2.14 |
Contributors
Thanks to the listed contributors for fixing bugs/testing & adding new features:
- Brandon Hinkel (https://github.com/b4ndit)
- initinfosec (https://github.com/initinfosec)