Stop Googling nmap flags. Just click.
Nmaple is a lightweight, browser-based nmap command builder. Pick the scan options you need from organized checkboxes and dropdowns, and Nmaple assembles the full command for you — ready to copy and paste into your terminal.
No frameworks. No build step. No dependencies. Just open index.html.
- Live command preview — the nmap command updates in real time as you toggle options
- Organized by category — scan types, host discovery, port specification, detection, timing, NSE scripts, evasion, and output
- Mutually exclusive options handled — scan type and timing use radio buttons so you can't accidentally combine incompatible flags
- Free-form inputs — enter custom port ranges, script names, output filenames, decoy addresses, and more
- Target field — optionally add your target IP, hostname, or CIDR so the command is ready to run
- One-click copy — copies the assembled command to your clipboard
- Reset button — clears everything back to a bare
nmap - Dark terminal-themed UI — monospace font, dark background, feels right at home next to your terminal
- Fully responsive — works on desktop and mobile
- Zero dependencies — vanilla HTML, CSS, and JavaScript
- **Completely offline - You can paste your target to make the entire flow easier. Not a single byte of data is collected.
| Category | Flags |
|---|---|
| Scan Type | -sS -sT -sU -sA -sW -sN -sF -sX -sn |
| Host Discovery | -Pn -PS -PA -PU -PE -n --traceroute |
| Port Specification | -p- -F -p <range> --top-ports <n> |
| Detection | -sV -O -A -sC |
| Timing | -T0 through -T5 |
| NSE Scripts | --script=vuln auth discovery safe + custom |
| Evasion | -f -ff -D --source-port --data-length |
| Output | -v -vv -d --reason --open --packet-trace -oN -oX -oG |
| Misc | -6 --privileged |
git clone https://github.com/odemiray/nmaple.git
cd nmaple
# Open index.html in your browser — that's it
open index.html # macOS
xdg-open index.html # Linux
start index.html # WindowsOr simply download the repository as a ZIP and open index.html.
- Open
index.htmlin any modern browser - Select the scan type, timing, and any other flags you need
- Optionally enter a target IP address or hostname
- Click Copy to copy the assembled command
- Paste into your terminal and run
nmaple/
├── index.html # Page structure and all nmap option controls
├── styles.css # Dark terminal-themed styling
├── app.js # Command builder logic and event handling
└── README.md
Contributions are welcome! Whether it's adding missing nmap flags, improving the UI, fixing bugs, or suggesting new features — all help is appreciated. However, I intend to keep this tool as basic as possible, so if you have an idea that complicates things in a way that it's no longer a "static webpage", please fork it and let me know about it so I can mention it here.
- Fork the repository
- Create your feature branch (
git checkout -b feature/my-feature) - Commit your changes (
git commit -m "Add my feature") - Push to the branch (
git push origin feature/my-feature) - Open a Pull Request
Some ideas for contributions:
- Add more nmap flags and options
- Add preset/recipe buttons for common scan profiles (e.g. "Quick Scan", "Full Audit")
- Add tooltips with detailed explanations for each flag
- Improve accessibility
- Add dark/light theme toggle
- Add command history or bookmarking
This project works out of the box with GitHub Pages. To enable it:
- Go to your fork's Settings → Pages
- Under Source, select Deploy from a branch
- Choose
mainbranch and/ (root)folder - Click Save
Your site will be live at https://<your-username>.github.io/nmaple/.
This project is open source. Feel free to use, modify, and distribute it. Contributions are appreciated as long as it's within KISS principle. If you want to go wild, let me know about your fork so I can display it here for other people.
Nmaple — because life's too short for nmap cheatsheets.
