An open API service indexing awesome lists of open source software.

https://github.com/abhaybhargav/robonmap

Robot Framework Library for popular Open Source Port Scanner and Vulnerability Scanner, Nmap
https://github.com/abhaybhargav/robonmap

nmap robot-framework robotframework

Last synced: 8 months ago
JSON representation

Robot Framework Library for popular Open Source Port Scanner and Vulnerability Scanner, Nmap

Awesome Lists containing this project

README

          

## RoboNmap

Robot Framework Library for the Nmap Port and Vulnerability Scanner.

### Keywords Implemented

##### Default Nmap Scan against a target
| nmap default scan | target | file_export |

- file_export is an optional param that exports the file to a txt file with the -oN flag

##### Default Nmap Scan against all TCP Ports
| nmap all tcp scan | target | file_export |

- file_export is an optional param that exports the file to a txt file with the `-oN` flag

##### Default Nmap UDP Scan with a Portlist Argument
Runs nmap against specified UDP ports given in the portlist argument.

Arguments:

- ``target``: IP or the range of IPs that need to be tested.
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen, example: 121,161,240 or 1-100
- ``file_export``: is an optional param that exports the file to a txt file with the -oN flag
Examples:
- `| nmap specific udp scan | target | portlist |`

##### Nmap OS Services Scan

Arguments:

- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap os services scan | target | portlist | version_intense | file_export |`

##### Nmap Script Scan
Runs nmap with the `-sC` arg or the `--script` arg if `script_name` is provided. Options used are: `-sV --version-intensity -sC|--script=`

Arguments:

- ``target``: IP or the range of IPs that need to be tested
- ``portlist``: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
- ``version_intense``: Version intensity of OS detection
- ``script_name``: Script Name that needs to be referenced
- ``file_export``: is an optional param that exports the file to a txt file with the `-oN` flag
Examples:
`| nmap script scan | target | portlist | version_intense | script_name | file_export |`

##### Print Nmap Scan Results
Retrieves the results of the current nmap scan results
Examples:

`| nmap print results |`