FastMap
FastMap
fastmap is a shell script tool designed to automate the process of quick port mapping using nmap. It starts with a rapid scan of all ports to identify open ports and then performs a detailed scan on those ports to identify services a
nd potential vulnerabilities. The results are saved in an <target-ip>.txt file in the current directory.
Prerequisites
Before using fastmap, ensure that nmap is installed on your system. nmap is available in most Linux distributions and can be installed using the default package manager.
Installation
To install fastmap on your system and make it executable, follow these steps:
git clone https://github.com/nika0x38/fastmap.git
cd fastmap
chmod +x install.sh && bash install.sh
After installation, you may need to restart your terminal or run:
For Bash users:
source ~/.bashrc
For Zsh users:
source ~/.zshrc
For other shells:
source ~/.profile
Usage
After installation, you can use fastmap directly from any terminal:
fastmap <target_ip>
fastmap -u <target_ip>
fastmap -h
fastmap -6
fastmap <target_ip>performs the original TCP workflow: a fast sweep of all ports followed by detailed service detection on anything open.fastmap -u <target_ip>runs the TCP workflow and adds a UDP top-ports 1000 scan. Sudo required.fastmap -6 <target_ip>runs the TCP workflow on ipv6. Can be used with -u.fastmap -hdisplays the built-in help message.
All scan results are saved as <target-ip>.txt in the current directory, with separate sections for TCP and UDP when both scans are executed.
Educational Purpose & CTF Usage
This tool is designed for educational purposes and Capture The Flag (CTF) competitions.