Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities

Posted on October 11, 2025October 11, 2025 By CWS

Together with the discharge of Kali Linux 2025.3, a serious replace introduces an progressive instrument that mixes synthetic intelligence and cybersecurity: the llm-tools-nmap.

A brand new experimental plugin, llm-tools-nmap, has been launched, offering Simon Willison’s command-line Giant Language Mannequin (LLM) instrument with community scanning capabilities.

This package deal integrates the highly effective and extensively used Nmap safety scanner, enabling LLMs to carry out community discovery and safety auditing duties via perform calling.

The latest launch of Kali Linux 2025.3 introduces a brand new instrument, together with gemini-cli, amongst others.

The plugin permits customers to subject pure language instructions to the LLM, that are then translated into particular Nmap scanning actions.

The first perform of llm-tools-nmap is to behave as a bridge between the LLM and the Nmap instrument. Its options cowl a variety of community scanning duties important for safety professionals and system directors.

The plugin can carry out community discovery to determine native community info and recommend applicable scan ranges.

It helps varied scanning sorts, together with fast scans of frequent ports, focused scans of particular port ranges, and ping scans to find dwell hosts on a community.

Extra superior capabilities embrace service detection to determine the software program and variations working on open ports, working system detection to profile goal methods, and the flexibility to run Nmap Scripting Engine (NSE) scripts for personalized and superior vulnerability detection.

Set up and Utilization

To make use of the plugin, a number of stipulations should be met. Customers want a working set up of Python 3.7 or increased, Simon Willison’s LLM instrument, and, critically, a purposeful Nmap set up.

Nmap could be simply put in on most working methods, akin to by way of sudo apt-get set up nmap on Debian/Ubuntu methods or brew set up nmap on macOS.

The instrument capabilities are at the moment experimental and could be invoked utilizing the –functions flag within the command line.

nmap_scan(goal, choices=””): Generic Nmap scan with customized choices

nmap_quick_scan(goal): Quick scan of frequent ports (-T4 -F)

nmap_port_scan(goal, ports): Scan particular ports

nmap_service_detection(goal, ports=””): Service model detection (-sV)

nmap_os_detection(goal): Working system detection (-O)

nmap_ping_scan(goal): Ping scan to find dwell hosts (-sn)

nmap_script_scan(goal, script, ports=””): Run NSE scripts

For instance, a person may provoke a scan by working a command like llm –functions llm-tools-nmap.py “scan my community for open databases”.

Different examples embrace discovering native community info or performing detailed service detection on particular IP addresses and ports.

The package deal gives a collection of particular capabilities, together with get_local_network_info(), nmap_quick_scan(goal), nmap_os_detection(goal), and nmap_script_scan(goal, script).

Whereas these capabilities supply highly effective automation, the builders have issued robust safety warnings. Customers are reminded that giving an LLM entry to safety instruments is experimental and will result in unintended penalties.

Sure Nmap options, akin to OS detection, require root or administrator privileges to perform accurately. Moreover, customers should all the time have specific permission to scan the goal networks and stay compliant with their group’s safety insurance policies concerning community scanning actions.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Capabilities, Kali, llmtoolsnmap, Network, Nmap, Scanning, Tool

Post navigation

Previous Post: New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
Next Post: 5 Immediate Steps to be Followed After Clicking on a Malicious Link

Related Posts

Cloudflare Unveils MCP Server Portals to Secure AI Revolution Cyber Security News
Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy Cyber Security News
Critical Qualcomm Vulnerabilities Allow Attackers to Execute Arbitrary Code Remotely Cyber Security News
NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges Cyber Security News
Cornwell Quality Tools Data Breach Cyber Security News
Axis Camera Server Vulnerabilities Exposes Thousands of Organizations to Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Fixes Long-standing Windows 11 ‘Update and Shut down’ Bug
  • 5 Immediate Steps to be Followed After Clicking on a Malicious Link
  • New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities
  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Fixes Long-standing Windows 11 ‘Update and Shut down’ Bug
  • 5 Immediate Steps to be Followed After Clicking on a Malicious Link
  • New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities
  • New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands
  • Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News