Redeye Nmap Scanner - Professional Edition A comprehensive Nmap scanning tool with session management, reporting, and advanced scanning capabilities. Available in both Python and Bash implementations.
- Automatic Dependency Management: Auto-detects OS and installs required tools (nmap, ndiff, xsltproc)
- Multi-Distribution Support: Ubuntu, Debian, Arch Linux, Fedora/RHEL, and Termux
- Session Management: Save and organize scan results with timestamped outputs
- Basic Scans: Ping scan, intense scan, fast scan, default scripts, vulnerability scanning
- Advanced Scans: 20+ advanced scanning techniques including:
- Firewall/IDS evasion (fragmentation, decoys, idle scans)
- Service-specific vulnerability scans (SMB, FTP, MySQL, Web)
- SSL/TLS vulnerability checks (Heartbleed)
- WAF detection and DoS vulnerability testing
- Full TCP/UDP comprehensive scans
- Scan Comparison: Compare two scan results using ndiff
- HTML Reporting: Generate professional HTML reports from XML scans
- Interactive Helper: Built-in Nmap command reference guide
- Color-coded Interface: Beautiful terminal UI with organized menus
- Debian/Ubuntu - APT package manager
- Arch Linux - Pacman package manager
- Fedora/RHEL/CentOS - DNF/YUM package managers
- Termux - Android terminal environment
- Others - Automatic fallback detection
The script automatically checks and installs:
nmap- Network exploration tool and security scannerndiff- Nmap scan comparison toolxsltproc- XSLT processor for HTML report generation
# Download the script
wget https://raw.githubusercontent.com/nexus-arm/redeye/main/redeye.py
# Make it executable
chmod +x redeye.py
# Run the scanner
python3 redeye.py-
Launch RedEye
# Python python3 redeye.py # Bash ./redeye.sh
-
Set a Target (Option 1)
Enter target IP or domain: 192.168.1.1 -
Create a Session (Option 8)
Enter session name: my_network_scan -
Run a Scan (Options 3-7 or 11)
- Choose from basic or advanced scan options
- Results are automatically saved to your session
- Ping Scan (3): Host discovery only, no port scanning
- Intense Scan (4): Aggressive scan with OS detection (-A -T4)
- Fast Scan (5): Quick scan of top 100 ports
- Default Scripts (6): Safe, default NSE scripts
- Vulnerability Scan (7): General vulnerability detection scripts
- Aggressive Discovery (All ping types)
- Full Port Scan (Skip host discovery)
- Fragmented Packets (Evade packet filters)
- Decoy Scan (Hide your IP among decoys)
- Idle Scan (Zombie host stealth scanning)
- Comprehensive Web Server Scan
- SMB Vulnerability Scan (EternalBlue, etc.)
- FTP Vulnerability Scan
- MySQL Vulnerability Scan
- Heartbleed SSL Check
- WAF Detection
- Slowloris DoS Vulnerability
- Full TCP & UDP Scan (Very slow)
- Safe Script Scan (Non-intrusive)
- Exploit Scripts (Dangerous - use with caution)
- Brute Force Scripts
- Traceroute & Geolocation
- Aggressive All Ports (-A -p-)
- Network Sweep (Ping only)
- All TCP Ports + OS Detection
All scans within a session are saved to redeye_sessions/<session_name>/ with automatic timestamping:
scan_YYYY-MM-DD_HH-MM-SS.nmap- Normal outputscan_YYYY-MM-DD_HH-MM-SS.xml- XML output for reports
Compare two XML scans to identify changes:
1. Select first scan file
2. Select second scan file
3. View differences using ndiff
Generate professional HTML reports:
1. Select XML scan file
2. Report generated at same location with .html extension
Set custom ports (Option 2) to focus scans:
Examples:
- Single port: 80
- Port range: 1-1000
- Multiple ports: 22,80,443
- Mixed: 22,80-100,443,8000-9000
Execute any nmap command while maintaining session saving:
Enter full nmap command: nmap -sV -O --script=vuln 192.168.1.1
Interactive reference guide covering:
- Host Discovery options
- Scan Techniques
- Port Specification
- Service & OS Detection
- Nmap Scripting Engine (NSE)
- Timing and Performance
- Output Formats
redeye/
├── redeye.py # Python implementation
├── redeye.sh # Bash implementation
├── README.md # This file
└── redeye_sessions/ # Created at runtime
└── <session_name>/
├── scan_*.nmap # Scan results (normal format)
├── scan_*.xml # Scan results (XML format)
└── scan_*.html # Generated HTML reports
Test the automatic dependency installation without running the full scanner:
# Python
python3 redeye.py --test-deps
# Bash
./redeye.sh --test-depsMany advanced scans require root privileges:
- SYN scans (-sS)
- OS detection (-O)
- UDP scans (-sU)
- Some stealth techniques
The script will automatically use sudo when needed.
- Dependency Verification: Checks all tools before scanning
- Session Isolation: Each project gets its own directory
- Automatic Backups: All scans saved with timestamps
- Warning Prompts: Dangerous scans require confirmation
- Error Handling: Graceful handling of missing tools or permissions
1. Set target: 192.168.1.0/24
2. Create session: home_network
3. Run ping scan (Option 3)
4. Review results in redeye_sessions/home_network/1. Set target: example.com
2. Create session: vulnerability_assessment
3. Run vulnerability scan (Option 7)
4. Generate HTML report (Option 10)1. Set target: 10.0.0.5
2. Set ports: 1-10000
3. Create session: service_enum
4. Run intense scan (Option 4)
5. Compare with previous scan (Option 9)1. Set target: webapp.example.com
2. Set ports: 80,443,8080,8443
3. Advanced menu (Option 11)
4. Web server scan (Option 6)
5. WAF detection (Option 11)- Ensure you have internet connectivity
- Check if your package manager is up to date
- Verify you have sudo privileges
- Try manual installation using suggested commands
- Use sudo for scans requiring root privileges
- Check firewall rules that might block scanning
- Verify target is reachable
- Ensure you've created a session (Option 8)
- Check write permissions in redeye_sessions/
- Verify disk space availability
IMPORTANT: This tool is for authorized security testing only.
- Only scan networks and systems you own or have explicit permission to test
- Unauthorized port scanning may be illegal in your jurisdiction
- Some scans can disrupt services or trigger security alerts
- The authors are not responsible for misuse of this tool
Always obtain proper authorization before conducting security assessments.
Contributions are welcome! Areas for improvement:
- Additional scan templates
- More OS/package manager support
- Enhanced reporting features
- Export formats (JSON, CSV)
- Scan scheduling and automation
This project is provided as-is for educational and authorized security testing purposes.
Built on top of the powerful Nmap security scanner by Gordon Lyon (Fyodor).
RedEye Nmap Scanner v1.0 - Professional Edition
Scan responsibly. Test ethically. Secure thoroughly.
