tew is a simple, quick 'n' dirty nmap parser for converting nmap xml output files to IP:Port notation.
For example:
1.1.1.1:80
1.1.1.1.1:443
This is useful for internal penetration tests and can be piped to httpx easily. As it is go, it compiles into a neat and tidy binary!
go install github.com/pry0cc/tew@latest
Binaries are available for most platforms and archectectures in the releases page.
# Run Nmap and save to XML output
nmap -T4 1.1.1.1 8.8.8.8 -oX file.xml
tew -x file.xml
tew -x file.xml | tee output.txt
tew -x file.xml | httpx -json -o http.json
# Perhaps we could process dnsx output and correlate for vhosts?
tew -x file.xml --dnsx dnsx.txt | httpx
- Create auto build using github ci & autobuild
- Add Arm64 for Darwin to Build
- Use proper flags library
- Add ability to import and use dnsx JSON & text output files - working on it!
# Credit
- @hakluke - Thank you man for helping me fix that dumb bug :)