Menu-driven Nmap Scanner for Beginners
Select scan types, understand every flag, get AI-powered analysis.
Every beginner (and even intermediate) security student hits the same wall:
# What you want to do:
"Scan all open ports and detect services on this IP"
# What you have to remember:
nmap -sV -sC -p- --open -T4 192.168.1.1
You forget flags. You Google it. You forget again.
Nmappy fixes this.
After scanning, understanding the output is also hard - especially for beginners.
Nmappy provides:
- Pre-built scan profiles - Select from 24+ scan types without memorizing flags
- Command explanation - See what each flag does
- LLM-powered analysis - Explains scan results in plain English
- Smart suggestions - Get investigation recommendations after scanning
- Ethical warnings - Reminders about authorization
- History tracking - Save scan history for reference
nmap-whisperer > scan all ports and detect OS on 192.168.1.100
ββ β‘ Generated Command βββββββββββββββββββββββββββββββββββββββ
β nmap -sV -O -p- 192.168.1.100 β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
ββ Flag Breakdown ββββββββββββββββββββββββββββββββββββββββββββ
-sV β Detect service versions on open ports
-O β Enable OS detection
-p- β Scan all 65535 ports
ββ What This Does ββββββββββββββββββββββββββββββββββββββββββββ
This performs a comprehensive scan that identifies every open
port, the service running on each port, and attempts to
fingerprint the operating system...
π‘ Follow-up: Run -sC to also execute default NSE scripts
- Python 3.8+
- Nmap installed (
sudo apt install nmap) - Anthropic API key (free tier works) β Get one here
# Clone the repo
git clone https://github.com/incrediblehacker/nmap-whisperer
cd nmap-whisperer
# Install dependencies
pip install -r requirements.txt
# Set your API key
export ANTHROPIC_API_KEY=your_key_here
# Run it
python nmap_whisperer.py| What you type | What it generates |
|---|---|
scan all open ports on 10.0.0.1 |
nmap -p- --open 10.0.0.1 |
find all devices on my network |
nmap -sn 192.168.1.0/24 |
stealthy scan on 10.10.10.5 |
nmap -sS -T2 10.10.10.5 |
check if SSH is open on this host |
nmap -p 22 <target> |
detect web servers on my LAN |
nmap -p 80,443,8080 --open 192.168.0.0/24 |
full aggressive scan |
nmap -A -T4 <target> |
| Command | Action |
|---|---|
examples |
Show example queries |
clear |
Clear the terminal |
quit / exit |
Exit the tool |
This tool is intended for authorized penetration testing and educational purposes only.
Always ensure you have explicit permission before scanning any network or system.
Unauthorized scanning is illegal and unethical. The author is not responsible for misuse.
User selects scan type from menu
β
Menu generates nmap command (no LLM needed)
β
Nmap executes scan, output captured
β
(Optional) LLM analyzes results:
- Explains findings in plain English
- Identifies security risks
- Suggests investigation steps
β
Rich terminal UI renders everything cleanly
nmap-whisperer/
βββ nmap_whisperer.py # Main CLI tool
βββ requirements.txt # Dependencies
βββ README.md # This file
Pull requests welcome. Ideas for improvement:
- Save scan history to a log file
- Export results to HTML report
- Add common scan presets/profiles
- Support multiple targets at once
Faizan Ali (@incrediblehacker) β Cybersecurity student | Forensics | Ethical Hacking
πΈ Instagram: @incrediblehacker | π GitHub: incrediblehacker
Made for beginners. Trusted by learners. Built for the curious. π