Skip to main content

RoboNmap - Robot Framework Library for the Nmap Port and Vulnerability Scanner

Project description

## RoboNmap

Robot Framework Library for the Nmap Port and Vulnerability Scanner.

### Keywords Implemented

##### Default Nmap Scan against a target
| nmap default scan | target | file_export |

- file_export is an optional param that exports the file to a txt file with the -oN flag

##### Default Nmap Scan against all TCP Ports
| nmap all tcp scan | target | file_export |

- file_export is an optional param that exports the file to a txt file with the `-oN` flag


##### Default Nmap UDP Scan with a Portlist Argument
Runs nmap against specified UDP ports given in the portlist argument.

Arguments:

- ``target``: IP or the range of IPs that need to be tested.
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen, example: 121,161,240 or 1-100
- ``file_export``: is an optional param that exports the file to a txt file with the -oN flag
Examples:
- `| nmap specific udp scan | target | portlist |`


##### Nmap OS Services Scan

Arguments:

- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap os services scan | target | portlist | version_intense | file_export |`

##### Nmap Script Scan
Runs nmap with the `-sC` arg or the `--script` arg if `script_name` is provided. Options used are: `-sV --version-intensity <default:0> -sC|--script=<script_name>`

Arguments:

- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``script_name``: Script Name that needs to be referenced
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap script scan | target | portlist | version_intense | script_name | file_export |`

##### Print Nmap Scan Results
Retrieves the results of the current nmap scan results
Examples:

`| nmap print results |`

Project details


Release history Release notifications | RSS feed

This version

1.1

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

RoboNmap-1.1.tar.gz (2.9 kB view details)

Uploaded Source

File details

Details for the file RoboNmap-1.1.tar.gz.

File metadata

  • Download URL: RoboNmap-1.1.tar.gz
  • Upload date:
  • Size: 2.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for RoboNmap-1.1.tar.gz
Algorithm Hash digest
SHA256 cb7aa962a044ff520cd0250f3daaf2ac677647a69fff49af861b629bab0b594a
MD5 710410e38297f9e9687d07ba25a54cfc
BLAKE2b-256 d791158ab9979b4a259364ab7fa0d64bf2a1ee456d2f9398d4e7ea2a5a329b9b

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page