Tired of pulling out the last few strands of hair while staring at your Nmap reports? Let me introduce you to Nmap Viewer!
The concept is simple: you run your usual Nmap scan, retrieve the XML file containing all the data, and instead of drowning in endless lines of information, you simply upload the file into a web interface. Voilà! All the data is displayed in a clear and organized manner.
But Nmap Viewer doesn’t just make your data look more appealing than Mark Zuckerberg 2024. No, this tool goes much further. You can filter your results to view only hosts with port 80 open, focus on Windows machines, or sort hosts based on various criteria. You can organize them by hostname, IP address, or even the number of open ports. This is especially useful when scanning a large network and you want to quickly identify the most exposed machines.
If you need to share your results with your team or a client, no problem! Nmap Viewer allows you to export your data in PDF format. Gone are the days of risky copy-pasting into Word—you’ll have a professional-looking report ready to go.
Nmap Viewer is open-source, responsive, and also allows you to update your results with additional XML files. So, if you’ve run a new scan, there’s no need to start over. Just add the new file into Nmap Viewer, and it will automatically merge everything for you.
The tool lets you expand or collapse all hosts and ports at once to dive into details when necessary, and you can even do this for each host individually. Another handy feature allows you to copy Nmap commands for specific hosts or for all hosts. No more retyping commands every time—just a quick copy-paste, and you’re good to go!
And if you went a little overboard with the filters, don’t worry! A simple click on the reset button will take you back to square one.
Let’s get practical! Here’s how to install and use Nmap Viewer, which is easier than building a PC in Minecraft:
- Start by downloading the installation script:
curl -O https://raw.githubusercontent.com/psyray/nmap-viewer/refs/heads/master/install.sh
- Make the script executable:
chmod +x install.sh
- Run the installation script:
./install.sh
This script will do all the work for you: it will clone the project repository, install Node.js if needed, install dependencies, build the application, and launch it on port 3001. It will even open the application in your default browser. Isn’t that neat?
Once the installation is complete, you can access the application at http://localhost:3001
. Then, upload your Nmap XML file and let the magic happen!
Useful links
Nmap – Official website: The official Nmap website offers complete documentation on how to use Nmap, the different scanning options, and NSE (Nmap Scripting Engine) scripts.
➡️ Nmap Official Website
Nmap Viewer – GitHub repository: The open-source Nmap Viewer project on GitHub.
➡️ Nmap Viewer GitHub Repository
Nmap Scripting Engine: For those who want to take Nmap a step further, the NSE Scripting Engine can automate tasks like service discovery and vulnerability checking.
➡️ Nmap NSE Documentation
Zenmap – GUI for Nmap: Zenmap is an official GUI of Nmap that makes the use of this tool more accessible for beginners while offering advanced features for experienced users.
➡️ Zenmap GUI for Nmap
Advanced Network Scanning Tools with Nmap: An in-depth article covering the different types of Nmap scans, advanced techniques, and performance optimization.
➡️ Network Scanning with Nmap(O’Reilly Media)
Nmap 101: A beginner’s guide: A guide for those who are new to Nmap, with practical examples of how to use them, explanations of the different types of scans, and output options.
➡️ Nmap Guide for Beginners