Make scan output actually useful

Nmap and RustScan output parser. Color-coded terminal reports via Rich. Multi-format exports. Interactive mode with concurrent targeted scans and live progress bars.

deluge
$ rustscan -a 10.10.10.0/24 --ulimit 5000 | deluge -sV
[*] Interactive mode — 3 workers
[scan 1/4] 10.10.10.5:22,80,443 — nmap -sV
[scan 2/4] 10.10.10.10:21,22 — nmap -sV

$ deluge --file scan.xml --export-format all
[+] Exported: json, csv, html, xml, txt
0
Export Formats
0
Parser Engines
0
HackTricks Links
0
Platforms

Parse, format, export

Auto-detects Nmap XML, Nmap stdout, and RustScan output. Rich-powered Catppuccin terminal UI with multi-format export.

Interactive Mode

Pipe RustScan output with Nmap flags and Deluge spawns targeted Nmap scans per discovered port with live progress bars. Configurable worker threads execute scans in parallel.

$ rustscan -a 10.0.0.1 --ulimit 5000 | deluge -A -T4 --threads 10
[*] Interactive mode — 10 workers
[========] 4/4 scans complete
5
Export Formats

Intelligent Parsing

Factory-pattern parser registry with priority ordering. Auto-detects Nmap XML (priority 1), Nmap stdout (priority 2), and RustScan output (priority 3).

Multi-Format Export

Generate JSON, CSV, HTML, XML, and TXT reports from a single scan. Exports land in timestamped subdirectories to prevent overwrites.

HackTricks Integration

For every open service, Deluge provides a direct link to the relevant HackTricks enumeration guide. Covers 40+ services from FTP to MongoDB.

3
Parser Engines

Syntax-Highlighted Nmap

Output reads like raw nmap — familiar PORT/STATE/SERVICE/VERSION columns with inline |_ script output — just with Catppuccin Mocha colors applied. No reformatting.

Nmap scan report for dc01.corp.local (10.0.19.80)
Host is up

PORT         STATE    SERVICE            VERSION
445/tcp    open     microsoft-ds      Windows Server 2008 R2
|_smb-os-discovery: Windows Server 2008 R2 SP1

Domain Extraction

Automatically extracts domain names, SSL certificate CNs/SANs, NetBIOS names, and AD forest information from host scripts and service data.

Capabilities

Full-featured on Linux, macOS, and Windows. Python 3.8+ with Rich for terminal rendering and Pydantic v2 for data models.

Nmap XML Parse
Nmap Stdout Parse
RustScan Parse
Interactive Mode
JSON Export
CSV Export
HTML Export
XML Export
TXT Export
HackTricks Links
OS Detection
NSE Scripts
Traceroute
Domain Extract
Catppuccin Theme
Progress Bars
Concurrent Scans
Safety Checks
Full   Partial   Not Supported

Parser factory architecture

Clean separation between parsing, formatting, and export. Pydantic v2 data models feed both the Rich formatter and the export manager.

1

Parser Factory

Registry of parsers with priority ordering. Each parser implements can_parse() and parse(). First match wins. Nmap XML, Nmap stdout, RustScan.

2

Scan Engine

Interactive mode orchestration with ThreadPoolExecutor. Spawns targeted Nmap scans per discovered port. Thread-safe result merging with live progress bars.

3

Rich Formatter

Catppuccin Mocha styled tables, panels, and progress bars. Color-coded ports, services, OS detection, NSE scripts, and traceroute hops.

4

Export Manager

Thread-safe multi-format export. JSON, CSV, HTML, XML, TXT. Timestamped subdirectories prevent overwrites. Shared ScanResult Pydantic model.

Install and parse

Python package installable via pipx or pip. No build step required.

install.sh
# Install with pipx (recommended)
$ pipx install git+https://github.com/Real-Fruit-Snacks/Deluge.git

# Or standard pip
$ pip install git+https://github.com/Real-Fruit-Snacks/Deluge.git

# Run tests
$ pytest --cov=deluge
usage.sh
# Interactive mode with RustScan
$ rustscan -a 10.10.10.0/24 | deluge -sV

# Parse existing Nmap XML
$ deluge --file scan.xml

# Export all formats
$ deluge --file scan.xml --export-format all

# Pipe from nmap
$ nmap -sV 10.10.10.5 -oX - | deluge