ANSE SCANNER v1.0: What is ANSE Scanner? ANSE Scanner is tool developed mainly for creating awareness among infosec folks to utilize Nmap(NSE script) completely and also to make them understand every NSE script purpose.So we developed this tool with easy interface for everyone to work with it and also to create new path in cyber security for future. For Further info regarding about NSE script HERE Updates If you want new features create a issue report and label it enhancement. Or start a pull request. we don't have enough time to daily change ANSE scanner. Changelog ANSE Scanner gets updates with new features, improvements and bugfixes. Be sure to check out the Changelog Getting Started git clone https://github.com/ cd ANSE-SCANNER chmod +x ANSE.py python3 ANSE.py How to contribute All contributions are welcome, from code to documentation, to design suggestions, to bug reports. Please use GitHub to its fullest-- submit pull requests, contribute tutorials or other wiki content-- whatever you have to offer, we can use it! Support us ! ANSE Scanner is developed with intended to create cyber security awareness in IT industry.if you want to support us in a any possible way,please do it.Here is our official Email address:contact@briskinfosec.com Requirements 1)Linux operating system with python3 (Kali linux (or) other Linux OS) Kali 2 & 2016 support the latest Nmap versions. 2)Python3.x must installed in linux for this tool to work In python2.x does not support some module. How it works 1)Run:Python3 ANSE.py 2)Enter your IP or host address without Protocol(http/https) Example:Target Host or Ip Adderss: Enter you Host IP:127.0.0.1 (or)www.example.com 3)Select your option for Task Example:For Service NSE Script Enter you Option no:1 4)Select your Service Type no: Example:For http Service Enter your Service no[int]:54 5)Select your Particular NSE script and Enter it no: Example:If http-enum is your Choosen NSE script for http service Enter your NSE script no:31 6)Read the manual displayed about NSE script for Usage 7)Select your option according to your requirement in testing Y/N/NIL(or)y/n/nill y -Default Option n -custom option i.e custom port,other option like -Pn,-sn nil-no port for the script 8)Enter your argument if any need At first run script with no argument(mostly works) If not worked use argument to get result as you excepted. Example:if you need script argument for any script (or) if you need other parameter like -sn,-sV,-Pn, Enter argument if u need or just press enter:-sn -sV --script-args=your argument 9)Enter your file name to save ANSE result Example:For www.example.com if you run http-enum NSE script Enter your file name to save:test ANSE scanner output stored directory:ANSE SCANNER/output/ Output file name format:www.example.com-"file_name-you-enter".txt Final output:ANSE SCANNER/output/www.example.com-test.txt 10)Common Keyword usage: [0] back For example:Enter 0 for moving back to previous menu. Credits: Tutorial ? Coming Soon....... you can visit my channel : https://www.youtube.com/channel/ Useful links: 1.BRISK INFOSEC 2.KALI 3.NSE Script 4.NCDRC Disclaimer Note: ANSE Scanner is intended to be used for legal security purposes only, and you should only use it to protect networks/hosts you own or have permission to test. Any other use is not the responsibility of the developer(s). Be sure that you understand and are complying with the ANSE Scanner licenses and laws in your area. In other words, don't be stupid, don't be an asshole, and use this tool responsibly and legally.