OpenClaw Skill
nmap-pentest-scans
Plan and orchestrate authorized Nmap host discovery, port and service enumeration, NSE profiling, and reporting artifacts for in-scope targets.
Install
$npx clawhub@latest install nmap-pentest-scans
View on GitHubv0.1.0
All-time installs8
Active installs8
Stars0
Nmap Pentest Scans
Stage
- PTES: 2-3
- MITRE: TA0007 - Discovery
Objective
Design reproducible Nmap scan workflows for authorized targets and produce deterministic scan-plan artifacts.
Required Workflow
- Validate scope before any active action and reject out-of-scope targets.
- Require explicit authorization for non-dry-run execution.
- Select profile (stealth, balanced, fast) and build command sequence.
- Produce normalized findings and export deterministic artifacts.
Execution
bash
python skills/nmap-pentest-scans/scripts/nmap_pentest_scans.py --scope scope.json --target <target> --input <path> --output <path> --format json --dry-runOutputs
scan-plan.jsonscan-plan.mdrecommended-commands.txtfindings/nmap-pentest-findings.jsonnmap-pentest-scans-report.json
References
references/tools.mdreferences/scan-profiles.mdskills/autonomous-pentester/shared/scope_schema.jsonskills/autonomous-pentester/shared/finding_schema.json
Legal and Ethical Notice
text
WARNING AUTHORIZED USE ONLY
This skill prepares and can orchestrate live network scan workflows.
Use only with written authorization and approved scope.Created by
@0x-professorPersistent memory
Give your OpenClaw agent a memory layer
Mem0 remembers users and context across sessions so you send fewer tokens and get better answers.
Try Mem0Mem0 + OpenClaw guide