DEPRECATED. check out Exclusion Enforcer instead. expandCIDR will use an nmap compliant scope list file and expand it, generating a file with the IP list. Optionally it can also select an arbitrary number of random IPs from the expanded IP list, instead. https://www.chaosnet.io
This repository has been archived on 2023-06-22. You can view files and clone it, but cannot push or open issues or pull requests.
Go to file
CURSORBLOCK 98aaf6669b Update 'README.md' 2022-09-20 02:01:16 +00:00
LICENSE Initial commit 2022-09-20 00:50:56 +00:00
README.md Update 'README.md' 2022-09-20 02:01:16 +00:00
expandcidr.sh Added help message 2022-09-19 20:41:10 -05:00

README.md

expandCIDR will use an nmap compliant scope list file and expand it, generating a file with the IP list.

Optionally it can also select an arbitrary number of random IPs from the expanded IP list, instead. Typically useful in large vulnerability assessments where testing a sample of a baselined subnet (such as SIP) is more efficient than testing the entire subnet.

usage: expandcidr [scope file] [output file] {# of rnd ips}

examples:

expandcidr scope_subnets.txt scope.txt

expandcidr scope.txt sample.txt 500