Hacking SecurityLinuxMac OsTools HackingWindows

WebMap – Nmap Web Dashboard And Reporting

WebMap Nmap

WebMap – Nmap Web Dashboard And Reporting


WebMap This project is designed to run on a Docker container. However, doing it on a custom installation of Django is not a good idea. However, if you need it, you will find all the steps of the build in the Docker file.


Import and analyze Nmap XML files
Statistics and graphs of detected services, ports, operating systems, etc.
Check a single host by clicking on its IP address
Attach labels to a host
Insert notes for a specific host
Create a PDF report with charts, details, captions, and notes
Copy as Nikto, Curl or Telnet command to the clipboard
Search for CVEs and exploits based on CPEs collected by Nmap
Changes in v2.1
Best use of the Django model
Some Nmap XML parsing problems have been fixed
Fixed issues with CVE collection and exploitation
Add a new network view
Add a RESTful API
PDF Report



You should use this with docker, just by sending this command:

$ mkdir /tmp/webmap
$ docker run -d \
         --name webmap \
         -h webmap \
         -p 8000:8000 \
         -v /tmp/webmap:/opt/xml \

$ # now you can run Nmap and save the XML Report on /tmp/webmap
$ nmap -sT -A -T4 -oX /tmp/webmap/myscan.xml

Now point your browser to http://localhost:8000

Quick and Dirty

$ curl -sL http://bit.ly/webmapsetup | bash

Upgrade from previous release

$ # stop running webmap container
$ docker stop webmap

$ # remove webmap container
$ docker rm webmap

$ # pull new image from dockerhub
$ docker pull rev3rse/webmap

$ # run WebMap
$ curl -sL http://bit.ly/webmapsetup | bash


Download WebMap


Wazuh Host and endpoint security

Scrounger – Application Testing Toolkit


Related Articles


Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button