Skip to content

pry0cc/tew

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

tew

tew is a simple, quick 'n' dirty nmap parser for converting nmap xml output files to IP:Port notation.

For example:

1.1.1.1:80
1.1.1.1.1:443

This is useful for internal penetration tests and can be piped to httpx easily. As it is go, it compiles into a neat and tidy binary!

Installation

Go install

go install github.com/pry0cc/tew@latest

Binaries

Binaries are available for most platforms and archectectures in the releases page.

Usage

# Run Nmap and save to XML output

nmap -T4 1.1.1.1 8.8.8.8 -oX file.xml

tew -x file.xml
tew -x file.xml | tee output.txt
tew -x file.xml | httpx -json -o http.json

Future Ideas

# Perhaps we could process dnsx output and correlate for vhosts?
tew -x file.xml --dnsx dnsx.txt | httpx 

Todo

  • Create auto build using github ci & autobuild
  • Add Arm64 for Darwin to Build
  • Use proper flags library
  • Add ability to import and use dnsx JSON & text output files - working on it!

# Credit

  • @hakluke - Thank you man for helping me fix that dumb bug :)

About

A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.

Resources

License

Stars

Watchers

Forks

Contributors 4

  •  
  •  
  •  
  •  

Languages