SaintsSec / Navi

An Interface for AI built for cybersecurity professionals
https://www.saintssec.org/
GNU Affero General Public License v3.0
78 stars 10 forks source link

Vincent/nmap update #52

Closed hullabaloo-vincent closed 2 months ago

hullabaloo-vincent commented 2 months ago

Nmap command actually works now. Using subprocess.run instead of the os function. I provided the opportunity for Navi to analyze the nmap output results instead of spitting out the output.

Output example

`Navi> How can I help you valiquo valiquo> run nmap scan on port 25 and 26 with -sV argument on scanme.nmap.org

Navi> Running... hang tight! Navi> Scan done! Would you like me to analyze the results or just see the raw output? (type 'analyze' or 'raw'): analyze Navi> Let's summarize the results of this Nmap scan:

Target: scanme.nmap.org (45.33.32.156) Status: The target is up and responding to probes with a latency of 0.091 seconds.

Open Ports:

Closed Ports:

Additional Information:

Overall, this Nmap scan indicates that the target is not responding to any open ports or services, suggesting that it may be a firewall-protected system or a honeypot (a decoy system designed to attract attackers). `

AlexKollar commented 2 months ago

Looking good Choom!