RoboNmap - Robot Framework Library for the Nmap Port and Vulnerability Scanner
Project description
## RoboNmap
Robot Framework Library for the Nmap Port and Vulnerability Scanner.
### Keywords Implemented
##### Default Nmap Scan against a target
| nmap default scan | target | file_export |
- file_export is an optional param that exports the file to a txt file with the -oN flag
##### Default Nmap Scan against all TCP Ports
| nmap all tcp scan | target | file_export |
- file_export is an optional param that exports the file to a txt file with the `-oN` flag
##### Default Nmap UDP Scan with a Portlist Argument
Runs nmap against specified UDP ports given in the portlist argument.
Arguments:
- ``target``: IP or the range of IPs that need to be tested.
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen, example: 121,161,240 or 1-100
- ``file_export``: is an optional param that exports the file to a txt file with the -oN flag
Examples:
- `| nmap specific udp scan | target | portlist |`
##### Nmap OS Services Scan
Arguments:
- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap os services scan | target | portlist | version_intense | file_export |`
##### Nmap Script Scan
Runs nmap with the `-sC` arg or the `--script` arg if `script_name` is provided. Options used are: `-sV --version-intensity <default:0> -sC|--script=<script_name>`
Arguments:
- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``script_name``: Script Name that needs to be referenced
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap script scan | target | portlist | version_intense | script_name | file_export |`
##### Print Nmap Scan Results
Retrieves the results of the current nmap scan results
Examples:
`| nmap print results |`
Robot Framework Library for the Nmap Port and Vulnerability Scanner.
### Keywords Implemented
##### Default Nmap Scan against a target
| nmap default scan | target | file_export |
- file_export is an optional param that exports the file to a txt file with the -oN flag
##### Default Nmap Scan against all TCP Ports
| nmap all tcp scan | target | file_export |
- file_export is an optional param that exports the file to a txt file with the `-oN` flag
##### Default Nmap UDP Scan with a Portlist Argument
Runs nmap against specified UDP ports given in the portlist argument.
Arguments:
- ``target``: IP or the range of IPs that need to be tested.
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen, example: 121,161,240 or 1-100
- ``file_export``: is an optional param that exports the file to a txt file with the -oN flag
Examples:
- `| nmap specific udp scan | target | portlist |`
##### Nmap OS Services Scan
Arguments:
- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap os services scan | target | portlist | version_intense | file_export |`
##### Nmap Script Scan
Runs nmap with the `-sC` arg or the `--script` arg if `script_name` is provided. Options used are: `-sV --version-intensity <default:0> -sC|--script=<script_name>`
Arguments:
- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``script_name``: Script Name that needs to be referenced
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap script scan | target | portlist | version_intense | script_name | file_export |`
##### Print Nmap Scan Results
Retrieves the results of the current nmap scan results
Examples:
`| nmap print results |`
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
RoboNmap-1.1.tar.gz
(2.9 kB
view details)
File details
Details for the file RoboNmap-1.1.tar.gz
.
File metadata
- Download URL: RoboNmap-1.1.tar.gz
- Upload date:
- Size: 2.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | cb7aa962a044ff520cd0250f3daaf2ac677647a69fff49af861b629bab0b594a |
|
MD5 | 710410e38297f9e9687d07ba25a54cfc |
|
BLAKE2b-256 | d791158ab9979b4a259364ab7fa0d64bf2a1ee456d2f9398d4e7ea2a5a329b9b |