NetMap — Visual Network Mapping CLI
Structure • Insight • Clarity — see how systems are built
Understand the system. Not just the endpoints.
NetMap is a visual mapping CLI that transforms domains, subdomains, and endpoints into a clear, structured overview.
No endless lists. No guessing.
Just:
netmap -d example.com
→ and instantly see how everything connects. Built as part of the NET Ecosystem alongside NetScope and NetForce.
NetMap is designed strictly for:
- Systems you own
- Systems you have explicit permission to analyze This tool performs network requests and structure mapping. Use responsibly.
curl -fsSL https://raw.githubusercontent.com/netseries/NetMap/main/install.sh | sh
Run instantly:
netmap --help
go install github.com/netseries/netmap/cmd/netmap@latest
Same system as NetScope & NetForce → no learning curve.
netmap -d <domain> [options]
| Flag | Description |
|---|---|
-d, --domain |
Target domain |
-p, --pack |
Discovery Pack (standard, dns-extended, web-deep, api-focused, admin-stealth, full, ultra) |
-w, --wordlist |
Path to custom local wordlist (.txt) |
-f, --focus |
Filter (all, auth, admin, api, config, dev, dns) |
-o, --output |
text |
-m, --mode |
basic |
-v, --verbose |
Debug output |
Use this for the most complete mapping of a target. It combines the largest intelligence set (2500+ targets) with deep DNS reconstruction and brute-forcing.
netmap -d example.com -p ultra -m advanced- What happens?: Scans 2500+ targets, performs high-volume DNS brute-forcing, and retrieves all CNAME/MX/TXT records.
Filter out all web noise and view pure DNS architecture and service providers.
netmap -d example.com -f dns- What happens?: Displays only infrastructure nodes like mail handlers (MX) and CDN aliases (CNAME).
Focus specifically on sensitive configurations and development artifacts.
netmap -d example.com -p full -f config- What happens?: Searches specifically for
.env,wp-config,.gitfolders, and other high-risk points.
Export the full graph to JSON for use in external visualization tools or analysis pipelines.
netmap -d example.com -o json > map.jsonUses Certificate Transparency logs (e.g., crt.sh) → finds known subdomains without directly targeting the server.
Performs concurrent HTTP requests and Deep DNS Lookups. → detects active endpoints and validates infrastructure records in real-time.
NetMap provides real-time terminal feedback during high-volume scans:
[~] Mapping: 12/50 hosts | 452/2500 endpoints | [Checking: /api/v2/config]
Endpoints are labeled automatically based on their nature:
[AUTH]→ login / authentication[ADMIN]→ administrative panels[API]→ API routes[DNS]→ Infrastructure records (CNAME, MX, TXT)[CONFIG]→ Sensitive configuration files (.env, settings)[DEV]→ Development artifacts (.git, Dockerfiles)[GENERAL]→ Standard web paths
Built by Netseries Team | Netseries.dev Contact: team@netseries.dev
This tool is for educational and authorized use only. Do not use it against systems without permission.
