Fixed help message output in case tmap was started with wrong arguments.
Parser variable was not existing and it was called in if blocks.
|2 months ago|
|.gitignore||1 year ago|
|CONTRIBUTORS.md||11 months ago|
|LICENSE||1 year ago|
|README.md||7 months ago|
|nmap-services||7 months ago|
|requirments.txt||1 year ago|
|tmap||2 months ago|
This port scanner was orginally made by Stevan Nestorovic to work over clearnet.
It was modifed to work over Tor for anonymous and hidden service scanning.
Tmap is a python script that requries the socks module and a running Tor deamon on localhost.
Tmap is built to support python3.
./tmap [-h] -H HOSTS [-p PORTS] [-t TIMEOUT] [--clearnet] [--torport TORPORT]
-H option can be used to specify hosts, but it is assumed by default.
Multiple hosts can be specified using a comma (ex.
./tmap -H 18.104.22.168,google.com,facebookcorewwwi.onion -p 80).
Tmap supports IP address ranges as well (ex.
./tmap 192.168.1.0/24 -p 22).
For private addresses, Tor is not used, but a direct connection is established instead.
Ports can be specified as a range (ex.
./tmap google.com -p 20-30),separated with a comma (ex.
./tmap 22.214.171.124 -p 25,53,80) or both.
Ports in a range are scanned including the ends of an interval (ex. in a range “20-30” both port 20 and 30 are scanned).
./tmap -H 126.96.36.199 -p 53,80
Scans ports 53 and 80 on 188.8.131.52
./tmap -H facebookcorewwwi.onion -p 80
Scan port 80 on facebookcorewwwi.onion
./tmap -H 192.168.0.1 -p 0-1024 --clearnet
Scan ports from 0 to 1024 on 192.168.0.1 without routing traffic through Tor.
./tmap 192.168.1.0/24,google.com -p 80
Scan the whole 192.168.1.0/24 range for an open port 80 without Tor and goole.com with Tor.
./tmap 184.108.40.206/31 -p 53
Scan the 220.127.116.11/31 range for an open port 53 with Tor.
GPLv3+: GNU GPL version 3 or later https://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.