Skip to main content

RoboNmap - Robot Framework Library for the Nmap Port and Vulnerability Scanner

Project description

## RoboNmap

Robot Framework Library for the Nmap Port and Vulnerability Scanner.

### Keywords Implemented

##### Default Nmap Scan against a target
| nmap default scan | target | file_export |

- file_export is an optional param that exports the file to a txt file with the -oN flag

##### Default Nmap Scan against all TCP Ports
| nmap all tcp scan | target | file_export |

- file_export is an optional param that exports the file to a txt file with the `-oN` flag


##### Default Nmap UDP Scan with a Portlist Argument
Runs nmap against specified UDP ports given in the portlist argument.

Arguments:

- ``target``: IP or the range of IPs that need to be tested.
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen, example: 121,161,240 or 1-100
- ``file_export``: is an optional param that exports the file to a txt file with the -oN flag
Examples:
- `| nmap specific udp scan | target | portlist |`


##### Nmap OS Services Scan

Arguments:

- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap os services scan | target | portlist | version_intense | file_export |`

##### Nmap Script Scan
Runs nmap with the `-sC` arg or the `--script` arg if `script_name` is provided. Options used are: `-sV --version-intensity <default:0> -sC|--script=<script_name>`

Arguments:

- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``script_name``: Script Name that needs to be referenced
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap script scan | target | portlist | version_intense | script_name | file_export |`

##### Print Nmap Scan Results
Retrieves the results of the current nmap scan results
Examples:

`| nmap print results |`

Project details


Release history Release notifications

This version

1.1

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for RoboNmap, version 1.1
Filename, size File type Python version Upload date Hashes
Filename, size RoboNmap-1.1.tar.gz (2.9 kB) File type Source Python version None Upload date Hashes View

Supported by

Pingdom Pingdom Monitoring Google Google Object Storage and Download Analytics Sentry Sentry Error logging AWS AWS Cloud computing DataDog DataDog Monitoring Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page