Skip to content
Robot Framework Library for popular Open Source Port Scanner and Vulnerability Scanner, Nmap
Python RobotFramework
Branch: master
Clone or download

Latest commit

Latest commit 875de2b Jan 11, 2019

Files

Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
robonmap nmap os service scan changes Jan 8, 2019
.gitignore
README.md
setup.py

README.md

RoboNmap

Robot Framework Library for the Nmap Port and Vulnerability Scanner.

Keywords Implemented

Default Nmap Scan against a target

| nmap default scan | target | file_export |

  • file_export is an optional param that exports the file to a txt file with the -oN flag
Default Nmap Scan against all TCP Ports

| nmap all tcp scan | target | file_export |

  • file_export is an optional param that exports the file to a txt file with the -oN flag
Default Nmap UDP Scan with a Portlist Argument

Runs nmap against specified UDP ports given in the portlist argument.

Arguments:

  • target: IP or the range of IPs that need to be tested.
  • portlist: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen, example: 121,161,240 or 1-100
  • file_export: is an optional param that exports the file to a txt file with the -oN flag Examples:
  • | nmap specific udp scan | target | portlist |
Nmap OS Services Scan

Arguments:

  • target: IP or the range of IPs that need to be tested
  • portlist: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
  • version_intense: Version intensity of OS detection
  • file_export: is an optional param that exports the file to a txt file with the -oN flag Examples: | nmap os services scan | target | portlist | version_intense | file_export |
Nmap Script Scan

Runs nmap with the -sC arg or the --script arg if script_name is provided. Options used are: -sV --version-intensity <default:0> -sC|--script=<script_name>

Arguments:

  • target: IP or the range of IPs that need to be tested
  • portlist: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100
  • version_intense: Version intensity of OS detection
  • script_name: Script Name that needs to be referenced
  • file_export: is an optional param that exports the file to a txt file with the -oN flag Examples: | nmap script scan | target | portlist | version_intense | script_name | file_export |
Print Nmap Scan Results

Retrieves the results of the current nmap scan results Examples:

| nmap print results |

You can’t perform that action at this time.