████
░░███ v0.8
░███ ██████ █████████ █████ ████ █████████████ ██████ ████████
░███ ░░░░░███ ░█░░░░███ ░░███ ░███ ░░███░░███░░███ ░░░░░███ ░░███░░███
░███ ███████ ░ ███░ ░███ ░███ ░███ ░███ ░███ ███████ ░███ ░███
░███ ███░░███ ███░ █ ░███ ░███ ░███ ░███ ░███ ███░░███ ░███ ░███
█████░░████████ █████████ ░░███████ █████░███ █████░░████████ ░███████
░░░░░ ░░░░░░░░ ░░░░░░░░░ ░░░░░███ ░░░░░ ░░░ ░░░░░ ░░░░░░░░ ░███░░░
███ ░███ ░███
░░██████ █████
░░░░░░ ░░░░░
[network penetration testing kit]
lazymap is a single command-line tool for network penetration testing. it combines multiple selected nmap scripts, sslscan, ssh-audit, dig, ldapsearch, curl, rpcclient, selected metasploit modules, PRET and wget.
- Bash version 4 or higher
- nmap
- curl
- dig
- ldapsearch
- rpcclient
- metasploit
- sslscan
- ssh-audit
- screen
git clone https://github.com/evanricafort/lazymap.git && cd lazymap && sudo chmod +x lazymap.sh lib/*.sh extra/*.sh reports/*.sh scans/*.sh && sudo ./lazymap.sh -h
- Single Host: ./lazymap.sh -u host
- Multiple Hosts/Subnet: ./lazymap.sh -t hosts
- Example Usage: ./lazymap.sh -t hosts -12bank --pret --exclude-udp --interface eth0 -o my_scan
Note: Run in sudo mode to execute NMAP scripts related to UDP scan and Responder.