This project is a cybersecurity assistant specialized in analyzing Nmap scan files. It extracts and analyzes relevant information from the scan results, identifies potential security vulnerabilities, and provides actionable insights for offensive security analysts.
- Extracts detailed information from Nmap scan results.
- Identifies open ports, services, service versions, and operating system details.
- Cross-references identified services and versions with publicly known CVEs.
- Highlights misconfigurations, outdated software, and weak security protocols.
- Provides clear and concise summaries of findings.
- Suggests actionable next steps for further reconnaissance and exploitation.
- Python 3.6+
- Required Python packages (listed in
requirements.txt
):- openai
- pwntools
- termcolor
- rich
- InquirerPy
- python-dotenv
pip install -r requirements.txt
-
Clone the repository:
git clone https://github.com/yourusername/nmap-scan-analyzer.git cd nmap-scan-analyzer
-
Install the required packages:
pip install -r requirements.txt
-
Create a
.env
file with your OpenRouter API key:OPENROUTER_API_KEY="your-api-key-here"
-
Ensure that the .env file is listed in .gitignore to avoid exposing your API key.
-
Run the main script:
python NmapIAnalize.py
-
Follow the prompts to select an Nmap output file to analyze.
-
The assistant will analyze the file and provide a detailed report of the findings.
-
You can ask further questions based on the analysis results.
An example Nmap output file (nmap_sample.txt
) is provided in the repository. You can use this file to test the functionality of the assistant.