Smap
AGPL-3.0๐ Network Recon ยท Go
Smap is a passive port scanner that replicates Nmap's interface and output format while using Shodan's internet-wide scan data instead of actively probing targets. It accepts the same command-line arguments as Nmap, making it a drop-in replacement for reconnaissance scenarios where stealth is critical. Since Smap queries Shodan's existing database rather than sending packets to targets, it leaves zero network footprint on the target infrastructure. Results include open ports, service banners, and version information that Shodan has previously collected.
Installation
$ go install github.com/s0md3v/smap@latestUse Cases
- Stealthy port scanning without touching the target
- Quick reconnaissance using existing Shodan data
- Drop-in Nmap replacement for passive workflows
- Pre-engagement intel gathering without triggering IDS
Tags
Details
- Category
- ๐ Network Recon
- Language
- Go
- Repository
- s0md3v/Smap
- License
- AGPL-3.0
- Platforms
- ๐งlinux๐macos๐ชwindows
Links
Community Reviews
Alternatives & Comparisons
Nmap
C/C++The gold standard network scanner. Host discovery, port scanning, service/version detection, OS fingerprinting.
Compare Smap vs NmapMasscan
CInternet-scale port scanner. Transmits 10 million packets per second. Asynchronous, stateless scanning.
Compare Smap vs MasscanMore in Network Recon
Nmap
C/C++The gold standard network scanner. Host discovery, port scanning, service/version detection, OS fingerprinting.
Masscan
CInternet-scale port scanner. Transmits 10 million packets per second. Asynchronous, stateless scanning.
RustScan
RustBlazing fast port scanner that pipes into Nmap. Scans all 65k ports in 3 seconds flat.
Shodan CLI
PythonCommand-line interface for Shodan, the search engine for internet-connected devices.
Wireshark
C/C++The world's foremost network protocol analyzer. Deep packet inspection for hundreds of protocols.
Responder
PythonLLMNR/NBT-NS/mDNS poisoner and rogue authentication server. Captures NTLMv1/v2 hashes on the network.