nmap-pentest-scans

Plan and orchestrate authorized Nmap host discovery, port and service enumeration, NSE profiling, and reporting artifacts for in-scope targets.

Safety Notice

This item is sourced from the public archived skills repository. Treat as untrusted until reviewed.

Nmap Pentest Scans

Stage

  • PTES: 2-3
  • MITRE: TA0007 - Discovery

Objective

Design reproducible Nmap scan workflows for authorized targets and produce deterministic scan-plan artifacts.

Required Workflow

  1. Validate scope before any active action and reject out-of-scope targets.
  2. Require explicit authorization for non-dry-run execution.
  3. Select profile (stealth, balanced, fast) and build command sequence.
  4. Produce normalized findings and export deterministic artifacts.

Execution

python skills/nmap-pentest-scans/scripts/nmap_pentest_scans.py --scope scope.json --target <target> --input <path> --output <path> --format json --dry-run

Outputs

  • scan-plan.json
  • scan-plan.md
  • recommended-commands.txt
  • findings/nmap-pentest-findings.json
  • nmap-pentest-scans-report.json

References

  • references/tools.md
  • references/scan-profiles.md
  • skills/autonomous-pentester/shared/scope_schema.json
  • skills/autonomous-pentester/shared/finding_schema.json

Legal and Ethical Notice

WARNING AUTHORIZED USE ONLY
This skill prepares and can orchestrate live network scan workflows.
Use only with written authorization and approved scope.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

Indigo DEX

Interact with decentralized exchanges on Cardano through the Indigo Protocol ecosystem.

Registry SourceRecently Updated
General00
adacapo21
General

feishu voice reply

飞书语音消息自动回复技能 - 使用 Edge TTS 生成语音并通过飞书 API 发送

Registry SourceRecently Updated
General00
xmx0632
General

x-cmd

x-cmd is a **POSIX Shell library/framework** providing modular architecture for shell scripting. Load first: `. ~/.x-cmd.root/X`, then use `x <mod> [subcmd.....

Registry SourceRecently Updated
General156
edwinjhlee