Your Lightweight Security Command Organizers
NmapLite & SqlmapLite offer intuitive, user-friendly, menu-driven interfaces for the powerful cybersecurity tools Nmap and Sqlmap. Effortlessly perform comprehensive network scans and SQL injection tests, saving valuable time and enhancing productivity.
Quickly execute various network scans through an organized interface:
# | Scan Type | Description |
---|---|---|
1 | π Intense Scan | Detailed, thorough network scan. |
2 | π‘ Intense Scan plus UDP | Includes additional UDP ports. |
3 | π Intense Scan, All TCP Ports | Comprehensive TCP analysis. |
4 | π Intense Scan, No Ping | Stealth scan without ping requests. |
5 | β‘ Ping Scan | Quickly detect live hosts. |
6 | π Quick Scan | Rapid scan of common ports. |
7 | π Quick Scan Plus | Enhanced quick scan results. |
8 | πΊοΈ Quick Traceroute | Trace packet routes rapidly. |
9 | π οΈ Regular Scan | Balanced thoroughness and speed. |
10 | π’ Slow Comprehensive Scan | Deep, extensive network analysis. |
11 | π― Scan Specific Ports | Targeted scanning for specific ports. |
12 | π Service Version Detection | Identify running service versions. |
13 | π» OS Detection | Detect target operating systems. |
14 | π₯ Aggressive Scan | Combine advanced Nmap techniques. |
15 | 𧱠Detect Firewall | Identify firewall configurations. |
16 | π‘οΈ Scan for Vulnerabilities | Find known vulnerabilities. |
17 | π¦ Scan for Malware | Malware detection scripts. |
18 | π Scan with NSE Scripts | Use custom NSE scripts. |
19 | β€οΈβπ©Ή Detect Heartbleed Vulnerability | Specialized Heartbleed test. |
20 | π Traceroute and Geolocation | IP geolocation and traceroute analysis. |
Efficiently conduct SQL injection testing and database reconnaissance:
# | Scan Type | Description |
---|---|---|
1 | π§ͺ Test for SQL Injection | Automatically find injection vulnerabilities. |
2 | π Fingerprint DBMS | Detect DB type/version. |
3 | π List Databases | Enumerate databases. |
4 | π List Tables | Tables within selected database. |
5 | π List Columns | Columns in specified table. |
6 | π₯ Dump Table Entries | Export table data. |
7 | π Dump Entries by Condition | Conditional data extraction. |
8 | π Search Database Names | Search databases by pattern. |
9 | π Search Table Names | Find tables by pattern. |
10 | ποΈ Search Column Names | Identify columns by pattern. |
11 | π Check Privileges | Evaluate DBMS user privileges. |
12 | π Check Roles | Review DBMS user roles. |
13 | π Retrieve Password Hashes | Extract user password hashes. |
14 | π§ Test for WAF/IPS | Bypass security with tamper scripts. |
15 | π₯ Enumerate Users | List database users. |
16 | π Enumerate User Privileges | Detail users' privileges. |
17 | π© Enumerate User Roles | Show users' assigned roles. |
18 | π§Ύ Enumerate Schema | Detailed DB schema info. |
19 | ποΈ System Databases | Identify system-level DBs. |
20 | π Enumerate Data | Comprehensive data retrieval. |
Quick installation steps for NmapLite & SqlmapLite:
git clone https://github.com/mikropsoft/NmapLite-SqlmapLite.git
cd NmapLite-SqlmapLite
sudo python main.py
Contributions are highly encouraged! To suggest improvements, add new features, or fix bugs, simply:
- Fork the repository
- Submit your changes via a Pull Request
This project is available under the MIT License.