https://github.com/abhaybhargav/robonmap
Robot Framework Library for popular Open Source Port Scanner and Vulnerability Scanner, Nmap
https://github.com/abhaybhargav/robonmap
nmap robot-framework robotframework
Last synced: 8 months ago
JSON representation
Robot Framework Library for popular Open Source Port Scanner and Vulnerability Scanner, Nmap
- Host: GitHub
- URL: https://github.com/abhaybhargav/robonmap
- Owner: abhaybhargav
- Created: 2017-10-03T03:41:36.000Z (about 8 years ago)
- Default Branch: master
- Last Pushed: 2023-07-16T06:43:31.000Z (over 2 years ago)
- Last Synced: 2024-10-09T23:40:58.558Z (about 1 year ago)
- Topics: nmap, robot-framework, robotframework
- Language: Python
- Size: 13.7 KB
- Stars: 19
- Watchers: 3
- Forks: 15
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
## RoboNmap
Robot Framework Library for the Nmap Port and Vulnerability Scanner.
### Keywords Implemented
##### Default Nmap Scan against a target
| nmap default scan | target | file_export |- file_export is an optional param that exports the file to a txt file with the -oN flag
##### Default Nmap Scan against all TCP Ports
| nmap all tcp scan | target | file_export |- file_export is an optional param that exports the file to a txt file with the `-oN` flag
##### Default Nmap UDP Scan with a Portlist Argument
Runs nmap against specified UDP ports given in the portlist argument.Arguments:
- ``target``: IP or the range of IPs that need to be tested.
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen, example: 121,161,240 or 1-100
- ``file_export``: is an optional param that exports the file to a txt file with the -oN flag
Examples:
- `| nmap specific udp scan | target | portlist |`##### Nmap OS Services Scan
Arguments:
- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap os services scan | target | portlist | version_intense | file_export |`##### Nmap Script Scan
Runs nmap with the `-sC` arg or the `--script` arg if `script_name` is provided. Options used are: `-sV --version-intensity -sC|--script=`Arguments:
- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``script_name``: Script Name that needs to be referenced
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap script scan | target | portlist | version_intense | script_name | file_export |`##### Print Nmap Scan Results
Retrieves the results of the current nmap scan results
Examples:`| nmap print results |`