


































---
𝗟𝟬𝗽𝟰𝗠𝗮𝗽 — Network monitoring, topology visualization & traffic analysis tool with full nmap integration
---
What L0p4Map Does
L0p4Map combines high-speed ARP discovery, full nmap integration, and real-time traffic analysis into a single dark professional interface. It scans your local network, classifies every device by role (gateway, router, AP, mobile, VM...), visualizes the topology as an interactive graph, and captures live network traffic — showing you exactly who is talking to whom, on which protocol and port, in real time.
(⚠️ Network traffic section is still in development)
Features:
● ARP host discovery with MAC vendor lookup and multi-method hostname resolution (reverse DNS, NetBIOS, mDNS)
● Dynamic network topology graph with intelligent device role classification
● Full nmap integration: SYN, UDP, OS detection, service version, NSE scripts, No-Ping mode
● Banner grabbing, vulnerability scanning, CVE correlation via Vulners
● Real-time traceroute analysis
● Network interface selector
● real-time network traffic inspection and analysis (In Development)
● Live monitoring — auto-refresh the graph at configurable intervals (30s / 60s / 120s)
● Scan export to .txt and graph export to CSV or PNG
● High-contrast dark UI built for efficiency
---
𝙏𝙖𝙧𝙜𝙚𝙩 𝘼𝙪𝙙𝙞𝙚𝙣𝙘𝙚
Security researchers, network administrators, and students learning network reconnaissance. It's an early-stage but functional tool — not yet production-ready, but solid enough for personal lab use, CTF environments, and authorized network auditing.
---
𝗖𝗼𝗺𝗽𝗮𝗿𝗶𝘀𝗼𝗻
Nmap is powerful but terminal-only and outputs raw text. Zenmap (the official nmap GUI) is abandoned and hasn't been updated in years. Wireshark focuses on packet capture rather than topology. L0p4Map fills the gap: it wraps nmap's full power in a modern dark PyQt6 interface with an interactive vis.js topology graph that updates in real time — something none of the existing open source alternatives offer.
𝗡𝗺𝗮𝗽 𝘄𝗮𝘀 𝗯𝗹𝗶𝗻𝗱. 𝗟𝟬𝗽𝟰𝗠𝗮𝗽 𝘀𝗲𝗲𝘀. 👁
⚠️ Still in active development
Just published my walkthrough for the Media machine on HTB. It's a Windows box that covers some really interesting techniques:
Arbitrary file write via NTFS Junction to achieve RCE
Recovering stripped privileges on a service account using FullPowers
Escalating to SYSTEM via GodPotato (SeImpersonatePrivilege abuse)
The writeup is beginner-friendly with explanations of why each technique works, not just how. I also noted which parts are covered in the CPTS path and which go beyond it.
https://severserenitygit.github.io/posts/HTB-Media-Machine-Walkthrough/ feedback welcome!





















hey guys i was trying to download delta for total drama roblox of off deltaios-executor.com but u did all the tasks and its trying to take me to itunes? is it a virus? is it safe?
Opa, saudações amigos!
Por um bom tempo, estou tentando começar a estudar a área de cibersegurança/pentester e procuro no yt,IA e alguns outros fóruns mas nunca consigo algo do tipo (comece por aqui). Conseguem me ajudar nessa? Por onde eu posso começar…
Anyone working with Agents or LLM's to create automated pentesting or recon?
I have a few things I'm working on but would like to see if anyone out there is doing something similar and would like to collaborate.
how can i send mass email to someone, without mails going to spambox....1000s of mail per day or more??
I have an old Samsung phone. After formatting it, they asked me to enter my old Gmail account, but I want to erase everything from the phone as if it were the first time I'm using it. Therefore, I would like a tool or some help from you.