Skip to main content

RoboNmap - Robot Framework Library for the Nmap Port and Vulnerability Scanner

Project description

## RoboNmap

Robot Framework Library for the Nmap Port and Vulnerability Scanner.

### Keywords Implemented

##### Default Nmap Scan against a target
| nmap default scan | target | file_export |

- file_export is an optional param that exports the file to a txt file with the -oN flag

##### Default Nmap Scan against all TCP Ports
| nmap all tcp scan | target | file_export |

- file_export is an optional param that exports the file to a txt file with the `-oN` flag


##### Default Nmap UDP Scan with a Portlist Argument
Runs nmap against specified UDP ports given in the portlist argument.

Arguments:

- ``target``: IP or the range of IPs that need to be tested.
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen, example: 121,161,240 or 1-100
- ``file_export``: is an optional param that exports the file to a txt file with the -oN flag
Examples:
- `| nmap specific udp scan | target | portlist |`


##### Nmap OS Services Scan

Arguments:

- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap os services scan | target | portlist | version_intense | file_export |`

##### Nmap Script Scan
Runs nmap with the `-sC` arg or the `--script` arg if `script_name` is provided. Options used are: `-sV --version-intensity <default:0> -sC|--script=<script_name>`

Arguments:

- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``script_name``: Script Name that needs to be referenced
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap script scan | target | portlist | version_intense | script_name | file_export |`

##### Print Nmap Scan Results
Retrieves the results of the current nmap scan results
Examples:

`| nmap print results |`

Project details


Release history Release notifications | RSS feed

This version

1.1

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

RoboNmap-1.1.tar.gz (2.9 kB view hashes)

Uploaded Source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page