Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Plan and orchestrate authorized Nmap host discovery, port and service enumeration, NSE profiling, and reporting artifacts for in-scope targets.
Plan and orchestrate authorized Nmap host discovery, port and service enumeration, NSE profiling, and reporting artifacts for in-scope targets.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
PTES: 2-3 MITRE: TA0007 - Discovery
Design reproducible Nmap scan workflows for authorized targets and produce deterministic scan-plan artifacts.
Validate scope before any active action and reject out-of-scope targets. Require explicit authorization for non-dry-run execution. Select profile (stealth, balanced, fast) and build command sequence. Produce normalized findings and export deterministic artifacts.
python skills/nmap-pentest-scans/scripts/nmap_pentest_scans.py --scope scope.json --target <target> --input <path> --output <path> --format json --dry-run
scan-plan.json scan-plan.md recommended-commands.txt findings/nmap-pentest-findings.json nmap-pentest-scans-report.json
references/tools.md references/scan-profiles.md skills/autonomous-pentester/shared/scope_schema.json skills/autonomous-pentester/shared/finding_schema.json
WARNING AUTHORIZED USE ONLY This skill prepares and can orchestrate live network scan workflows. Use only with written authorization and approved scope.
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.