1
0
mirror of https://github.com/nmap/nmap.git synced 2026-02-07 05:56:34 +00:00
dmiller c3d54f1fac Change how ms-sql NSE scripts run
MS SQL NSE scripts run on database instances, which can be TCP or named
pipes. With this change, all TCP instances on scanned ports will have
script output attached under the port as a portrule script. Named pipe
instances and TCP instances on unscanned ports will be displayed in the
hostrule script output at the end of the host's output. Utility function
mssql.Helper.InitScript makes it easy to write scripts that just work on
a per-instance basis, without bothering where to put the output.
Discovery will be done once per host, regardless of how many scripts are
run, and can be guaranteed to be done before the script's action takes
place.
2022-01-03 21:08:52 +00:00
2021-07-19 23:58:02 +00:00
2021-07-19 23:58:02 +00:00
2022-01-03 21:08:52 +00:00
2022-01-03 21:08:52 +00:00
2020-08-27 19:13:31 +00:00
2020-08-27 19:13:31 +00:00
2017-09-19 17:01:40 +00:00
2020-08-27 19:13:31 +00:00
2020-08-27 19:13:31 +00:00
2018-10-16 05:18:31 +00:00
2014-06-26 20:12:54 +00:00
2020-01-15 05:18:27 +00:00
2019-05-29 15:11:13 +00:00

Nmap Build Status Language grade: C/C++ Language grade: Python Total alerts

Nmap is released under a custom license, which is based on (but not compatible with) GPLv2. The Nmap license allows free usage by end users, and we also offer a commercial license for companies that wish to redistribute Nmap technology with their products. See Nmap Copyright and Licensing for full details.

The latest version of this software as well as binary installers for Windows, macOS, and Linux (RPM) are available from Nmap.org

Full documentation is also available on the Nmap.org website.

Questions and suggestions may be sent to the Nmap-dev mailing list.

Installing

Ideally, you should be able to just type:

./configure
make
make install

For far more in-depth compilation, installation, and removal notes, read the Nmap Install Guide on Nmap.org.

Using Nmap

Nmap has a lot of features, but getting started is as easy as running nmap scanme.nmap.org. Running nmap without any parameters will give a helpful list of the most common options, which are discussed in depth in the man page. Users who prefer a graphical interface can use the included Zenmap front-end.

Contributing

Information about filing bug reports and contributing to the Nmap project can be found in the HACKING and CONTRIBUTING.md files.

Languages
C 37.5%
Lua 28.1%
C++ 16.8%
Shell 5.8%
Python 4.2%
Other 7.3%